There are two primary types of supply chain attacks in cybersecurity:
Software supply chain attacks involve attackers targeting software developers and suppliers. If they find a weak point, they can inject malware into a trusted app or program used across an entire supply chain of vendors.
Social engineering supply chain attacks involve attackers compromising a vendor account and using it to send convincing phishing attacks.
In software supply chain attacks, a cybercriminal accesses unsecured networks, servers, and apps where they can change source code to hide malware. Software developers unknowingly ship this infected code and use it by partners in their supply chain.
Besides looking for cybersecurity vulnerabilities, criminals often use social engineering tactics to exploit organizational relationships via email to gain access to a network. These include:
Vendor Email Compromise (VEC): A criminal gains unauthorized access to an email account and uses it to target trusted partners. It often works because the malicious email comes from a vendor you trust or have worked with previously. This can be difficult for organizations to spot since a known email address is used to make the fraudulent request.
Email Spoofing: A phishing attack using an email address that looks similar to the real organization the criminal is mimicking. It tricks the recipient into thinking the message originates from a trusted contact.
When a criminal uses one of these attacks, they ask a vendor to pay an invoice or update billing information. The business, thinking the email was sent from a trusted partner, obliges. The criminal then fraudulently receives funds.
Criminals also use exploited supply chains to spread malware through phishing emails. Supply chain attacks are highly sophisticated, and it’s challenging to identify suspicious messages from trusted email accounts.