Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceTransportation/Logistics/Supply Chain/Distribution/ Warehousing

Cybercriminals are closing in on supply chains

By Pete Starr
Warehouse worker with electronic device
December 28, 2021

The rapidly evolving and advancing threat landscape makes each new day more threatening than the last. As each industry strengthens their defenses, cybercriminals are constantly on the hunt for unsuspecting businesses and any gaps in their security. Events over the past year have shown that adversaries have a new target.

Supply chains have increasingly found themselves in the attackers’ scopes, especially those within the manufacturing, logistics and oil and gas sectors. This year alone we have seen high impact cyberattacks on critical infrastructure organizations, such as Colonial Pipeline, designed to cause maximum disruption to business operations. And while these attacks are primarily thought of as highly sophisticated in terms of the techniques used, they often aren’t actually that complicated. 

So, why are supply chains seen as easy targets?

The main reason why supply chains within manufacturing and other critical infrastructure sectors are targeted is because they generally have made less investment into cyber defenses. In comparison to more financially lucrative industries such as banking or insurance, manufacturing companies often have smaller budgets and therefore allocate less funds to cybersecurity. However, these industries are not short of data, and this can be just as valuable to a threat actor. To make matters worse, this data is often poorly protected. The manufacturing industry is heavily reliant on legacy technology, and it can be difficult finding the time and money to integrate new solutions with existing security stacks. However, this legacy tech often isn’t compatible with the latest security updates, so data is left vulnerable to threats. Just like a wooden hut on the edge of the sea, any wave could be the cause of its collapse.

Critical infrastructure supply chains are often extremely people oriented, with teams collaborating across businesses — and unfortunately, people are a common tool in cyberattackers’ strategies. Using social engineering techniques, criminals can extract seemingly harmless data that can grant them the minimum access they need to kickstart their campaign. On top of this, manufacturing is a very transactional business, with thousands of emails being fired off every day within the supply chain, equalling a much wider margin for error. It’s safe to say that attackers are on the lookout for any situation indicating increased vulnerability, whether that be underresourced teams, limited cyber training or smaller budgets. 

The past few years have witnessed a major increase in cloud migration and adoption of Office 365 as remote working becomes a permanent part of the workforce’s future. Unfortunately, many organisations who have jumped aboard this train significantly increased their attack surface without the added security measures to mitigate this. And this is the low hanging fruit that threat actors have their sights set on.

What are the most common attack methods?

Over the past decade, phishing has been established as one of the most widely used threat vectors as it can be adapted to suit pretty much any business layout. From emails to text messages and phone calls, phishing is versatile and used in most major cyber threat campaigns today. 

Social media and our ever-growing online presence are adding fuel to the phisher’s fire. It’s now easier than ever to find out crucial information about someone from a simple search on the web. Cybercriminals put in the time to research their victims. LinkedIn, in particular, can reveal a lot about a business’s employees — including the people employees deal with regularly, their writing style and their position within the company. All this data makes it much easier for a criminal to impersonate someone at an organization and launch a convincing phishing campaign, which is why business email compromise (BEC) is an extremely common occurrence within most supply chains. 

Phishing is usually used as the first step in a multistage attack campaign. Where before it would be deployed as a standalone technique to harvest financial information or personally identifiable information (PII) to use at a later date, phishing now provides attackers with the entry point for further exploitation. Additionally, the dispersed workforces are now far more vulnerable to phishing attempts — instead of being surrounded by people to help identify fraudulent emails, employees are left isolated at home. And with Office 365 often being the only barrier between phishers and their targets, it’s unsurprising that this threat vector has grown in popularity. Companies must also face the added complexity of Microsoft account takeover attacks allowing cyberattackers to use legitimate email accounts to carry out their activities.

Whilst the big headlines are talking about ransomware, of which the Colonial Pipeline breach is a prime example, these kinds of attack normally start with a successful phishing attempt. When combined, phishing and ransomware makes a deadly weapon.   

What can supply chains do to protect themselves?

When faced with a growing tsunami wave of cyber threats but a limited budget to build defenses, it can become quite overwhelming for supply chains. However, there are a few simple steps that companies can take to construct an effective perimeter line. 

Maintaining basic cyber hygiene is the foundations for any security strategy — it’s essential that all patching is kept up-to-date and that every member of the team has a rudimentary understanding of cybersecurity. Securing the business is no longer just the responsibility of the security professionals. Beyond this, secondary layers of defense like multi-factor authentication (MFA) and sophisticated email security will greatly improve each company’s security posture within the supply chain. 

Once an attacker breaches one company within the supply chain, it is far easier for them to move between the individual businesses given how much communication and collaboration takes place. Implementing anti-phishing and inbox security solutions that analyze incoming emails to identify malicious content is fundamental. Furthermore, machine learning and behavioral analytics are also powerful tools to use against phishers and will greatly strengthen the supply chain’s overall security stance. If each individual company within the chain completes the basic breach prevention techniques, then the entire collective can stand strong against the surge of attackers gathering outside the perimeter.

KEYWORDS: cloud migration cyber attack cyber defense cyber risk management cyber security leadership email spam phishing attack ransomware supply chain cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pete Starr is Director of Customer Engineering at Cyren.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    82% of CIOs believe their software supply chains are vulnerable

    See More
  • supply chains disrupted by COVID-19

    Report illustrates severity of COVID-19 impact on global supply chains

    See More
  • The Daily Challenges of Supply Chain Security

    CISA releases analysis report on COVID-19 impact to ICT global supply chains

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing