Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SSA-673996 V1.3 (Last Update: 2025-12-09): Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products

    April 9, 2026

    From Legal Theory to Practice

    April 9, 2026

    HackTheBox – DarkZero

    April 9, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»The Evolving Threat of Vendor Email Compromise
    Alerts

    The Evolving Threat of Vendor Email Compromise

    adminBy adminApril 9, 2026No Comments7 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The Evolving Threat of Vendor Email Compromise and a Recent Incident Targeting an Alberta Organization

    This report is distributed as TLP:CLEAR. Recipients may share this information without restriction. Information is subject to standard copyright rules.

    Disclaimer | CyberAlberta

    Executive Summary  

    On May 27th, 2025, an Alberta-based organization was targeted by a threat actor impersonating a trusted third-party vendor attempting to fraudulently redirect funds. This type of attack, known as Vendor Email Compromise (VEC), is similar to the more commonly known Business Email Compromise (BEC), but is distinguished by the specific impersonation of vendors known to the target organization. In this incident, a threat actor compromised a member of the target organization’s mailbox, enabling monitoring of ongoing business communications. After identifying an ongoing invoice conversation, the threat actor hijacked the email thread, sending a PDF letter impersonating the vendor, requesting the fraudulent redirection of payment to a threat actor-controlled account.

    This attack occurred shortly before researchers at Abnormal AI released a report demonstrating high levels of engagement with VEC attacks, driven by increasingly sophisticated levels of social engineering tactics. A similar incident targeting Ireland’s National Treasury Management Agency (NTMA) successfully impersonated a known third-party investment company to steal €5 million Euros (~$8 million CAD). Taken together, these recent events in the province and beyond show that cyber threats are becoming more advanced. To stay safe, organizations should follow strict steps to verify transactions and encourage staff to question and report anything that seems unusual.

    Vendor Email Compromise

    VEC is the malicious act of impersonating legitimate third-party vendors to socially engineer unsuspecting victims into committing fraudulent payments to the threat actor. These attacks result from either a compromise of the target organizations mailbox, or the mailbox of the target organizations vendors. If a foothold in either email environment is achieved, the threat actor will perform deep reconnaissance on communications between the target and the vendor, enabling significantly more convincing lures.

    After gaining an understanding of who the trusted vendors are, the threat actor can impersonate the vendors and assume the identity of their representatives. Domains that bear a likeness to the vendor will likely be created, using techniques such as typosquatting, use of an alternative top-level domain (TLD), or subdomain takeover. Most alarmingly, if vendors themselves have suffered a prior compromise, threat actors can then abuse their legitimate infrastructure for launching VEC attacks, helping bypass email security measures in place.  

    Example Company Impersonation Method Example Impersonation
    vendorname.ca Typosquatting [email protected]
    Alternative TLD [email protected]
    Subdomain Takeover abandoned-subdomain.vendorname.ca

     

    Table 1 – Examples of domain impersonations that could be leveraged in VEC attacks.

    Other common techniques used by threat actors to increase the efficacy of their VEC attacks include:

    • Hijacking email threads between the victim and the legitimate vendor, exploiting the existing trust and context to insert malicious instructions.
    • Creating a false sense of urgency by claiming an invoice is overdue or requires payment, pressuring the target to act quickly without proper verification.
    • Claiming the impersonated vendor’s bank details have been changed, with the intent of redirecting payments to threat actor-controlled accounts.
    • Stealing and modifying legitimate invoices from compromised mailboxes, using them as a template to create convincing fraudulent versions with the threat actor’s banking information substituted in.

    While these attacks require significant time and effort to plan and execute, the result is highly convincing and difficult to distinguish from routine business operations.

    Recent Analysis by Abnormal AI

    Between the period of March 2024 to March 2025, threat researchers at Abnormal AI monitored the mailboxes of over 1,400 client organizations. They tracked occurrences of what they refer to as “second-step engagement”, a term used to describe when a user replies to a VEC email or forwards it to a non-phishing mailbox. The analysis revealed that the top three sectors with the highest levels of second-step engagement with VEC attacks were:

    1. Telecommunications
    2. Energy
    3. Hospitality

    High engagement was also observed across several other sectors, including critical infrastructure. Unsurprisingly, employees in accounting or sales roles showed the highest rates of engagement with VEC attacks, project managers also ranked among the most frequently engaged job categories.

    Incident Affecting Alberta-based Organization

    Recently, CyberAlberta was alerted to a VEC attack targeting an Alberta-based organization that was successfully detected, preventing any loss in funds. The threat actor had gained access to the organization’s email environment and remained dormant to observe ongoing communications. After identifying an ongoing order with a local third-party vendor, the threat actor saw an opportunity to attempt a fraudulent redirection of the associated invoice payment.  

    Figure 1 below shows the last legitimate email and attached invoice, sent by the vendor representative (referred to here as M.T. to preserve anonymity), prior to the threat actor’s attempt.

    Legitimate Email

     

    Figure 1 – Last email from the legitimate vendor representative prior to the attempted fraudulent payment redirection, notifying the organization of an invoice that is due payment.

    The target organization responded to this legitimate email from the vendor, asking if they have an Electronic Fund Transfer (EFT) option available. At this point, the threat actor intervened—impersonating  M.T.—and sent a forged email containing a doctored PDF that falsely claimed the vendor updated their bank details for EFT. To increase pressure, the threat actor also asked whether the payment could be processed within the same week.  

    The threat actor’s malicious email and corresponding PDF letter can be seen below in Figure 2.

    Illegitimate Email

     

    Figure 2 – Malicious email and doctored PDF from the threat actor impersonating the vendor representative M.T., fraudulently claiming the vendor has changed the payment details to the threat actor controlled account.

    Visually, the attack is highly convincing. The threat actor impersonates M.T., hijacks a legitimate email thread, retains the original subject line containing the known invoice number, and even replicates the vendor’s logo in the doctored PDF. But what makes this—and similar attacks—particularly deceptive is that it occurs within the context of a legitimate, pre-scheduled payment, making it far less likely to raise suspicion.

    To the average user, the only noticeable difference is the email sender domain.  

    • The vendor representative sent emails from a .ca domain address (payables@[vendor-domain].ca).
    • The threat actor intervened with malicious emails from an impersonating .com domain address (payables@[impersonating-vendor-domain].com).

    It was this subtle discrepancy, identified by a vigilant user, that exposed the attack and ultimately prevented the loss of over 50,000 CAD. However, the same threat actor was also linked to another VEC attack targeting other Alberta-based organizations which did result in a minor financial loss. This demonstrates how such attacks are rarely confined to a single target and will opportunistically pursue financial extortion wherever possible.

    Recommendations

    To help prevent VEC attacks, organizations are encouraged to implement the following measures:

    • Incorporate VEC Into User Awareness Training: Reference this report when updating user awareness training materials. Ensure targeted training is provided to staff in accounting, sales, and project management roles, or any roles responsible for processing payments to third parties.
    • Enable Email Authentication Protocols: While primarily applicable to vendors, it is best practice for all organizations to implement DMARC along with SPF and DKIM on their domains. These protocols help prevent threat actors from spoofing domains to deliver VEC attacks.
    • Strengthen Incident Response for VEC Attacks: In an event of a detected VEC attack, network defenders should consider the following actions:

    – Reset credentials for any mailbox accounts suspected of compromise and ensure multi-factor authentication (MFA) is enabled across all users. 

    – Conduct threat hunting for similar emails from the threat actor, using indicators such as the sender domain, sender display name, email subject, or attachment names to identify any other attempted VEC attacks. 

    – Audit mailbox rules for suspicious forwarding or auto-delete rules that have been implemented by the threat actor to avoid detection. 

    – Review user account groups for any anomalous account creations or modifications that grant access either to potentially compromised mailboxes, or other sensitive areas of the email environment.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSSA-915282 V1.0: Denial of service Vulnerability in Interniche IP-Stack based Industrial Devices
    Next Article HackTheBox – DarkZero
    admin
    • Website

    Related Posts

    Alerts

    SSA-673996 V1.3 (Last Update: 2025-12-09): Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products

    April 9, 2026
    Alerts

    SSA-915282 V1.0: Denial of service Vulnerability in Interniche IP-Stack based Industrial Devices

    April 9, 2026
    Alerts

    Juniper Networks security advisory (AV26-334)

    April 9, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    SSA-673996 V1.3 (Last Update: 2025-12-09): Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products

    April 9, 2026

    From Legal Theory to Practice

    April 9, 2026

    HackTheBox – DarkZero

    April 9, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.