Vendors as Your Largest BEC Threat: The Shift to Financial Supply Chain Compromise in 2022

Threat actors have shifted their strategy—moving away from internal impersonation and instead focusing on impersonating third parties. Watch the webinar to learn more about this new threat: financial supply chain compromise.

Since the CEO fraud that dominated the last few years isn't nearly as successful as it used to be, threat actors have shifted their strategy—moving away from internal impersonation and instead focusing on impersonating third parties.

This shift represents a substantial evolution in the business email compromise (BEC) threat landscape and has given rise to what we call financial supply chain compromise. Failing to recognize and mitigate this new threat can be costly: the average invoice fraud attack costs $183,000, and Abnormal has seen attacks with requests of upwards of $2.1 million.

In this on-demand webinar, Crane Hassold, Director of Threat Intelligence, answers your questions about financial supply chain compromise, including:

  • What are the various types of financial supply chain compromise?

  • How do threat actors use impersonation and account compromise to run invoice fraud, aging report attacks, and RFQ scams?

  • Why have threat actors shifted tactics, and what do your employees need to know?

  • How can you stop these evolving attacks before they reach your inboxes?

Complete the form to watch the recording.

Vendors as Your Largest BEC Threat: The Shift to Financial Supply Chain Compromise in 2022

Watch Now

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Resources

B 07 20 22 Devastating
Business email compromise (BEC) is no joke, and it continues to increase—despite increased awareness of the issue. Learn about the future of BEC attacks in this on-demand webinar.
Watch Now
Report fscc cover
For years, executives were the go-to impersonated party in business email compromise attacks. Now, threat actors are opting to impersonate vendors and suppliers instead.
Download Now
Webinar cover 3
Colonial Pipeline. CNA Financial. Quanta. Even the NBA. Hardly a week goes by without a ransomware story hitting the news, as organizations worldwide are targeted by an attack. But are there more dangerous threats out there?
Watch Now
H1 threat report cover
From June-December 2021, Abnormal Security discovered that nearly all types of advanced email attacks grew in frequency, with a new trend of phone fraud using email as the first contact.
Download Now
Webinar hacking tobac cover
Rachel Tobac talked to Abnormal Security's CISO Mike Britton about hacking, social engineering attacks, and how to protect your organization.
Watch Now
Webinar beyond spam cover
Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks.
Watch Now
Webinar cover 4
CISOs deal with a multitude of threats that can have significant financial and reputational impacts. Of those threats, business email compromise is the #1 attack type, costing businesses almost as much as all other cybersecurity incidents combined.
Watch Now
Webinar cover 1
Traditional cybersecurity infrastructure can’t stop new and emerging threats, particularly in the email channel, and cybercriminals are constantly changing their methods to stay one step ahead. Hear how Theresa Payton, first female White House CIO, thinks about these attacks.
Watch Now