Vendor email compromise (VEC), also known as supply chain compromise, is a rapidly growing cyber threat that targets businesses through trusted vendor relationships. Unlike traditional business email compromise (BEC) scams, VEC attacks primarily target external partners and suppliers, making them more challenging to detect. This post explains what VEC is, why it succeeds, and how to protect your organization.
Vendor email compromise occurs when cybercriminals impersonate or compromise a vendor’s email account to deceive businesses. These attacks aim to:
Unlike BEC scams, which typically impersonate internal executives, VEC attacks exploit the trust businesses place in their vendors and suppliers.
A typical VEC attack unfolds in four stages:
Stage 1: Initial Compromise. Attackers gain access to a vendor’s email account through phishing, credential stuffing, or by using lookalike domains.
Stage 2: Information Gathering. Cybercriminals conduct reconnaissance, analyzing vendor-client interactions and collecting sensitive information, such as payment schedules and authorized personnel details.
Stage 3: Account Takeover. Forwarding rules are set up in the compromised account, allowing attackers to monitor communications undetected.
Stage 4: Attack Execution. Fraudulent emails are sent to clients, requesting payment changes or credential verification using language and timing that appear legitimate.
These attacks succeed because of the following reasons:
Potential VEC risks and impacts include the following:
Organizations can take the following steps to reduce the potential for being victimized:
Both cyber and crime insurance policies can provide coverage for direct financial losses stemming from fraudulent fund transfers, invoice manipulation and payment diversion. However, coverage depends on a policy’s specific wording.
Some policies may only be triggered by a direct breach of system security and may not extend to situations where employees are misled into taking fraudulent actions, such as authorizing payments in VEC attacks. Some policies may not respond when employees voluntarily send funds unless specific social engineering or fraudulent instruction endorsements are in place. An experienced insurance broker can ensure that cyber and crime insurance policies complement each other, identify coverage gaps, and suggest specific endorsements (e.g., social engineering fraud) to ensure robust financial protection against VEC attacks and other deception-based threats. Brokers can also support organizations throughout the claims process, potentially helping to achieve faster resolution of coverage determinations and claim settlements.
Contact us today for additional guidance on cyber risk management.
The above information does not constitute advice. Always contact your insurance broker or trusted advisor for insurance-related questions.