GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Supply Chain-Based Phishing Attacks on the Rise

  • Author(s):
  • Elaine Dzuba

Unfortunately, BEC continues to evolve with attackers using account takeovers (ATOs) as a crucial element of supply chain attacks. Compromised credentials and emails lend authenticity to sophisticated Type 3 and 4 supply chain-based BEC attacks and allow attackers to evade detection for longer periods. For example, there are indications that attackers in the SolarWinds supply chain attack compromised the company’s Microsoft Office 365 email as part of the drawn-out campaign.

Based on what we’ve seen in customer environments and in the wild, here’s our annual guide to understanding the ongoing evolution of BEC.

  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Format:
  • eBook
Topics:
Website:Visit Publisher Website
Publisher:Area 1 Security
Published:January 28, 2021
License:Copyrighted
Copyright:© 2021 Area 1 Security

Download Content

By clicking the button below, I agree to the GovWhitePapers Terms & Conditions.

Featured Content

Contact Publisher

Claim Content