We use cookies to provide you with a better experience. By continuing to browse the site you are agreeing to our use of cookies in accordance with our Cookie Policy.
  • INDUSTRY PRESS ROOM
  • SUBMISSIONS
  • MEDIA FILE
  • Create Account
  • Sign In
  • Sign Out
  • My Account
Free Newsletters
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
  • STRATEGY
  • GLOBAL
  • LOGISTICS
  • MANUFACTURING
  • PROCUREMENT
  • VIDEO
    • News & Exclusives
    • Viewer Contributed
    • CSCMP EDGE 2022 Startup Alley
    • Upload your video
  • PODCAST ETC
    • Podcast
    • White Papers
    • Webcasts
    • Events
    • Blogs
      • Reflections
      • SCQ Forum
    • Mobile Apps
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
  • STRATEGY
  • GLOBAL
  • LOGISTICS
  • MANUFACTURING
  • PROCUREMENT
  • VIDEO
    • News & Exclusives
    • Viewer Contributed
    • CSCMP EDGE 2022 Startup Alley
    • Upload your video
  • PODCAST ETC
    • Podcast
    • White Papers
    • Webcasts
    • Events
    • Blogs
      • Reflections
      • SCQ Forum
    • Mobile Apps
Home » Report: E-mail vulnerabilities threaten supply chains

Report: E-mail vulnerabilities threaten supply chains

58% of organizations experienced an attempted supply chain attack in the past year, and poor e-mail security may be to blame, cybersecurity firm data show.

banner-5217685_640.jpg
August 4, 2021
Supply Chain Quarterly Staff
No Comments
Nearly 60% of organizations have experienced an attempted supply chain attack in the past year, and e-mail vulnerabilities are a prime route to damage, according to data from Waltham, Mass.-based e-mail and cybersecurity firm GreatHorn.

The firm's Threat Intelligence Team released data showing that one of the most prominent techniques used in supply chain attacks is a form of man-in-the-middle (MitM) attack, in which an attacker compromises login credentials to leverage legitimate e-mail communication between parties in order to carry out their supply chain attack. Known as Vendor Email Compromise (VEC), the method allows attackers to log into a user’s e-mail so they can pose as that user and leverage trusted relationships in the user’s supply chain to take advantage of existing e-mail threads, or data, the company said.

“Given the quantity of workers remaining in a remote capacity, and the increase in phishing attacks that lead to malicious sites that compromise credentials, an organization’s supply chain has become a significant target for cybercriminals,” according to GreatHorn’s research on defending against vendor e-mail compromise. “With 3.7% of all e-mails containing potentially malicious links that bypass native e-mail security controls, and 41% of organizations stating that users click on malicious links daily, identifying links that attempt to harvest credentials is the first step for organizations in securing and protecting their users from account takeovers.”

To help prevent attacks, the research shows companies should augment or replace traditional e-mail security approaches with more sophisticated techniques; those include advanced computer vision programs that can analyze suspicious links and prevent employees from accessing password-stealing accounts, as well as biometric authentication programs that can recognize a user’s unique typing patterns such as keystroke speed, pressure, timing, and more.

“Attackers will continue to launch continuous attacks against supply chain partners, gaining access to supplier systems, including e-mail. Identifying spoofed vendors/individuals that can send malicious links and compromised partner accounts calls for advanced e-mail security techniques,” according to the company. “By augmenting or replacing traditional e-mail security approaches with more sophisticated capabilities, organizations can detect and mitigate the risk of supply chain attacks.”
KEYWORDS GreatHorn

    Recent Articles by Supply Chain Quarterly Staff

    Cargo theft and fraud rose 41% in the first 20 weeks of 2023 over last year, CargoNet warns

    Gartner: Top supply chains of ’23 balance risk control, new growth channels

    OSHA, industrial safety experts to headline National Forklift Safety Day 2023

    You must login or register in order to post a comment.

    Report Abusive Comment

    Most Popular Articles

    • Report: Sagging freight stats show that trucking sector is returning to its historic mean

    • Survey: parcel delivery drivers are frustrated by using their own smartphones for work

    • Heavy transport across two continents

    • Survey: most Americans unaware that truckers face shortage of parking spaces

    • Supply chain executives not yet seeing expected results from technology investments

    Featured Video

    20221107korber large vs

    Enhancing Customer Experience with Your Supply Chain Strategy

    Viewer Contributed
    With the rise of e-commerce, many businesses have had to transform their warehouses to handle online orders in addition to regularly scheduled inventory shipments. This means warehouses need more information than ever before to ensure they can meet customers' needs. As a result, companies need to select warehouse...

    FEATURED WHITE PAPERS

    • Three layers of forklift safety: Promoting operating best practices

    • The Complete Guide to Automated Packaging

    • Five tips for parcel success in 2023

    • Guide to Pallet Rack Safety

    View More

    Subscribe to Supply Chain Quarterly

    Get Your Subscription
    • SUBSCRIBE
    • E-NEWSLETTERS
    • ADVERTISING
    • CUSTOMER CARE
    • CONTACT
    • ABOUT
    • STAFF
    • PRIVACY POLICY

    Copyright ©2023. All Rights ReservedDesign, CMS, Hosting & Web Development :: ePublishing