abnormalsecurity.com Open in urlscan Pro
76.76.21.21  Public Scan

URL: https://abnormalsecurity.com/resources/financial-supply-chain-compromise?form=success
Submission: On June 22 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="EmbeddedForm__form">
  <div class="EmbeddedForm__field mb-4">
    <div class="EmbeddedForm__field mb-4 text-black-01 text-white-01"><label class="EmbeddedForm__labelWrapper block bg-white-01 bg-white-01/10 text-white-01">
        <div class="EmbeddedForm__label text-xs opacity-50 px-4 pt-2 text-current">First Name</div><input name="firstName" required="" type="text" class="EmbeddedForm__input form-input w-full pt-0 bg-transparent" value="">
      </label></div>
  </div>
  <div class="EmbeddedForm__field mb-4">
    <div class="EmbeddedForm__field mb-4 text-black-01 text-white-01"><label class="EmbeddedForm__labelWrapper block bg-white-01 bg-white-01/10 text-white-01">
        <div class="EmbeddedForm__label text-xs opacity-50 px-4 pt-2 text-current">Last Name</div><input name="lastName" required="" type="text" class="EmbeddedForm__input form-input w-full pt-0 bg-transparent" value="">
      </label></div>
  </div>
  <div class="EmbeddedForm__field mb-4">
    <div class="EmbeddedForm__field mb-4 text-black-01 text-white-01"><label class="EmbeddedForm__labelWrapper block bg-white-01 bg-white-01/10 text-white-01">
        <div class="EmbeddedForm__label text-xs opacity-50 px-4 pt-2 text-current">Email Address</div><input name="email" required="" type="email" class="EmbeddedForm__input form-input w-full pt-0 bg-transparent" value="">
      </label></div>
  </div>
  <div class="EmbeddedForm__field mb-4">
    <div class="EmbeddedForm__field mb-4 text-black-01 text-white-01"><label class="EmbeddedForm__labelWrapper block bg-white-01 bg-white-01/10 text-white-01">
        <div class="EmbeddedForm__label text-xs opacity-50 px-4 pt-2 text-current">Company Name</div><input name="company" required="" type="text" class="EmbeddedForm__input form-input w-full pt-0 bg-transparent" value="">
      </label></div>
  </div>
  <div class="EmbeddedForm__field mb-4">
    <div><label class="flex items-center"><input name="Email_Opt_In__c" type="checkbox" class="form-checkbox" value="">
        <div class="block ml-4">I would like to receive email updates from Abnormal Security. By submitting this form you agree to the terms listed in our
          <a href="https://abnormalsecurity.com/privacy-policy/" target="_blank" id="privacypolicy">privacy policy</a>.</div>
      </label></div>
  </div>
  <div class="EmbeddedForm__field mb-4"><input name="leadSource" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Organic Website"></div>
  <div class="EmbeddedForm__field mb-4"><input name="campaign" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="7015G000000JnLtQAK"></div>
  <div class="EmbeddedForm__field mb-4"><input name="CStatus" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Downloaded Report"></div>
  <div class="EmbeddedForm__field mb-4"><input name="contentStage" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Stage 3"></div>
  <div class="EmbeddedForm__field mb-4"><input name="marketingRelease" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Processing"></div>
  <div class="EmbeddedForm__field mb-4"><input name="Lead_Source_Detail__c" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02"
      value="This person downloaded our Supply Chain Compromise Threat Intel Report, &quot;From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise&quot;"></div>
  <div class="EmbeddedForm__field mb-4"><input name="flexField" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
  <div class="EmbeddedForm__field mb-4"><input name="utm_campaign" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="7015G000000JnLtQAK"></div>
  <div class="EmbeddedForm__field mb-4"><input name="utm_content" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
  <div class="EmbeddedForm__field mb-4"><input name="utm_medium" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
  <div class="EmbeddedForm__field mb-4"><input name="utm_source" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Direct"></div>
  <div class="EmbeddedForm__field mb-4"><input name="utm_term" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
  <div class="EmbeddedForm__field mb-4"><input name="engagementDetailTemp" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02"
      value="This person downloaded our Supply Chain Compromise Threat Intel Report, &quot;From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise&quot;"></div>
  <div class="EmbeddedForm__field mb-4"><input name="GCLID__c" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
  <div class="EmbeddedForm__buttons"><button type="submit" class="EmbeddedForm__button flex items-center justify-center ml-auto h-10 px-5 text-white-01 border hover:bg-white-01 hover:text-black-01 hover:border-white-01 rounded-sm">Download</button>
  </div>
</form>

Text Content

Why Abnormal/Products/Solutions/Customers/Partners/Resources/Careers/
See a Demo


Resource Center


FROM CEO FRAUD TO VENDOR FRAUD: THE SHIFT TO FINANCIAL SUPPLY CHAIN COMPROMISE

Threat Intel ReportsSupply Chain Compromise

Share via:
LinkedIn
Facebook
Twitter

For years, executives were the go-to impersonated party in business email
compromise (BEC) attacks. Recently, however, attackers have adjusted their
strategies—opting to impersonate third-party vendors and suppliers instead.

In January 2022, the number of attacks impersonating third parties surpassed
those impersonating internal employees for the first time. This trend has
continued each month since, with third-party impersonations making up 52% of all
BEC attacks in May 2022.


Download the threat intelligence report for valuable insight into financial
supply chain compromise, including:

 * What the four types of supply chain compromise look like

 * How threat actors impersonate vendors in two specific ways

 * Why BEC attacks impersonating executives have decreased 17% year-over-year


FILL OUT THE FORM TO ACCESS THE FULL REPORT.


After reading this report, you are eligible for 1 CPE credit through (ISC)².



DOWNLOAD NOW


First Name
Last Name
Email Address
Company Name
I would like to receive email updates from Abnormal Security. By submitting this
form you agree to the terms listed in our privacy policy.














Download





SEE THE ABNORMAL SOLUTION TO THE EMAIL SECURITY PROBLEM

Protect your organization from the attacks that matter most with Abnormal
Integrated Cloud Email Security.

See a Demo




RELATED RESOURCES

Supply Chain CompromiseWebinars
Protecting Yourself From Your Supply Chain: A CISO Panel on Email Security

While you may be confident in your own email security, the truth is that your
security is only as good as the security of your partners and vendors. Discover
why vendor email compromise is such an important part of your security strategy.

Watch Now
Supply Chain CompromiseThreat Reports
Q1 2021: The Rising Threat of Vendor Email Compromise

Read the Q1 2021 threat report to learn the latest on vendor email compromise,
including which scams are most successful and why the volume of attacks has
grown so significantly.

Download Now
Account TakeoverBusiness Email CompromiseSupply Chain CompromiseThreat Reports
Q2 2021: High-Profile Socially-Engineered Email Attacks Drive Record-High
Employee Engagement & Fraud

Attackers are leveraging social engineering to drive significantly higher
engagement and account takeover. In the Q2 2021 threat report, Abnormal found
that attacks are growing at significant rates, as threat actors leverage social
engineering strategies to bypass SEGs and drive engagement.

Download Now
Account TakeoverBusiness Email CompromiseSupply Chain CompromiseThreat Reports
Q3 2021: Account Takeover Attempts Rise 671%, Reaching Unprecedented Levels

Cybercriminals upped their game over the last quarter—increasing the number of
credential phishing attacks and account takeover attempts. In our quarterly
threat report, Abnormal Security discovered significant increases in the number
of brute force attacks and impersonation attempts.

Download Now
Supply Chain CompromiseWhite Papers
CISO Guide to Supply Chain Compromise

Supply chain compromise attacks can cause substantial financial loss through
invoice or payment fraud. Learn how and why attackers leverage compromised
accounts from vendors to launch attacks that are specifically designed to bypass
traditional email security.

Download Now

Why Abnormal

Products
Integrated Cloud Email Security

Inbound Email Protection

Account Takeover Protection

SOC Automation

Additional Platform Capabilities

Solutions
For Microsoft Office

For Google Workspace

Credential Phishing

Malware and Ransomware

Supply Chain Compromise

Invoice and Payment Fraud

Spam and Graymail

Business Email Compromise

Cloud Account Takeover

Displace Your Secure Email Gateway (SEG)

Customers
Customers Overview

Customer Stories

Gartner Peer Insights

Partners
Microsoft + Abnormal

Partner Portal

Technology Partners

Resource Center
Resource Center

Abnormal Blog

Engineering Blog

Attack Stories

Customer Support

Company
About

Upcoming Events

Careers

Team

Machine Learning at Abnormal

Abnormal Engineering Spotlight

News & Press

Abnormal Business School

Abnormal Precisely Stops Zero-Day Email Attacks
©2022 Abnormal Security Corp. All rights reserved.
Responsible DisclosureDPATrust CenterStatusPrivacy PolicyTerms of UseContact
UsSitemap