Abstract Seafoam Joint

Vendors as Your Largest BEC Threat: The Shift to Financial Supply Chain Compromise in 2022

Since the CEO fraud that dominated the last few years isn't nearly as successful as it used to be, threat actors have shifted their strategy—moving away from internal impersonation and instead focusing on impersonating third parties.

This shift represents a substantial evolution in the business email compromise (BEC) threat landscape and has given rise to what we call financial supply chain compromise. Failing to recognize and mitigate this new threat can be costly: the average invoice fraud attack costs $183,000, and Abnormal has seen attacks with requests of upwards of $2.1 million.

In this on-demand webinar, Crane Hassold, Abnormal's Director of Threat Intelligence, answers your questions about financial supply chain compromise, including:

  • What are the various types of financial supply chain compromise?

  • How do threat actors use impersonation and account compromise to run invoice fraud, aging report attacks, and RFQ scams?

  • Why have threat actors shifted tactics, and what do your employees need to know?

  • How can you stop these evolving attacks before they reach your inboxes?

Complete the form to watch the recording and learn how to protect your organization from financial supply chain compromise attacks.

After viewing this webinar, you are eligible for 1 CPE credit through (ISC)².

Watch Now

Related Resources

Report fscc cover
For years, executives were the go-to impersonated party in business email compromise attacks. Now, threat actors are opting to impersonate vendors and suppliers instead.
Download Now
Webinar cover 3
While you may be confident in your own email security, the truth is that your security is only as good as the security of your partners and vendors. Discover why vendor email compromise is such an important part of your security strategy.
Watch Now
Threat report 3
Read the Q1 2021 threat report to learn the latest on vendor email compromise, including which scams are most successful and why the volume of attacks has grown so significantly.
Download Now
Threat report 2
Attackers are leveraging social engineering to drive significantly higher engagement and account takeover. In the Q2 2021 threat report, Abnormal found that attacks are growing at significant rates, as threat actors leverage social engineering strategies to bypass SEGs and drive engagement.
Download Now
Threat report 1
Cybercriminals upped their game over the last quarter—increasing the number of credential phishing attacks and account takeover attempts. In our quarterly threat report, Abnormal Security discovered significant increases in the number of brute force attacks and impersonation attempts.
Download Now
B 03 25 22 CISCO Guide to VEC
Supply chain compromise attacks can cause substantial financial loss through invoice or payment fraud. Learn how and why attackers leverage compromised accounts from vendors to launch attacks that are specifically designed to bypass traditional email security.
Download Now