web analytics

From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise

Download Info PDF | 12.7 MB

Since its initial identification in 2013, business email compromise (BEC) has been dominated by executive impersonation. But over the past few years, attackers have adjusted their strategies—opting to impersonate third party vendors and suppliers instead. In January 2022, the number of attacks impersonating third parties surpassed those impersonating internal employees for the first time. This trend has continued each month since, with third-party impersonations making up 52% of all BEC attacks in May 2022. We’ve seen this shift to what we’ve termed financial supply chain compromise for a number of reasons, most notably because it gives threat actors a plethora of additional trusted identities to exploit. Even the smallest businesses likely work with at least one vendor, and larger companies have supplier numbers in the hundreds or thousands. And while the average employee has some level of familiarity with the company’s executive team, they may not have that same awareness of the organization’s entire vendor ecosystem—particularly in larger enterprises. Further, the vendor-customer dynamic has an intrinsic financial aspect to it, which means emails requesting payments or referencing bank account changes are less likely to raise red flags.

To learn more please download this whitepaper.

Download this free e-guide now!
Once we receive your request, We'll send you direct download link to your work email.

Indice X-Force Threat Intelligence

IBM Security develops intelligent enterprise security solutions and services...

What Legacy Endpoint Security...

Do legacy endpoint security solutions serve security teams well...

Building Business Resilience to...

Regardless of the industry, data drives today’s enterprise. The...

Download more...

The New Accessibility Audit: A User-First Approach

More organizations than ever have committed to digital accessibility. By doing so, they’re meeting legal compliance obligations, including the requirements of the Americans with...

Getting Started with Agile Accessibility

Agile accessibility incorporates accessibility into every phase of the digital experience life cycle, from ideation and design through development, testing, and deployment. It’s about...

Agile Accessibility in UX and UI Design

As the architects and artists of the digital world, most user experience (UX) and user interface (UI) designers have one primary goal: to create...

Criação do departamento de TI sustentável

Everything that benefits people and the planet will also benefit your organization's bottom line. As environmental sustainability and climate action continue to differentiate organizations,...

A segurança do endpoint é um elemento essencial da sua jornada de Zero Trust

Zero Trust is a long-term journey. It is not a product or a solution that organizations implement: it is a strategic framework to manage...

Gain Productivity and Improve Security With Modern Devices: A Comparative Study

Now that companies have overcome the pandemic, 74% of U.S. businesses are moving toward a sustainable hybrid work model. Whether you're restructuring your offices...

Gagner en productivité et renforcer la sécurité avec des appareils modernes: une étude comparative

À présent que les sociétés ont surmonté la pandémie, 74 % des entreprises américaines évoluent vers un modèle de travail hybride pérenne. Que vous...

Boosting Productivity and Security With Modern Devices: A Comparative Study

As companies navigate the era beyond pandemic responses, 74 percent of U.S. companies are moving toward a permanent hybrid work model.1 And whether you’re...

Ausfallsicherheit bei Cyberangriffen

Während immer mehr Unternehmen mit softwarebasierten Rechenzentren arbeiten, steigt auch deren Abhängigkeit von Servern als Grundlage für Geschäftsfunktionen. Das bedeutet, dass Serversicherheit der grundlegende...