Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

The Rise of Vendor Fraud in a World of AI and Trade Chaos

By Shai Gabay
Laptop with money

Kenny Eliason via Unsplash

July 2, 2025

The rising trade tensions are prompting businesses to reconfigure their global vendor networks at breakneck speed. But in their rush to avoid the impact of tariffs and rising costs, many are walking straight into a minefield of fraud.

With supply chains under strain and urgency driving decision-making, procurement and finance teams are rapidly forging new vendor relationships and payment channels. These fast-moving changes, made under pressure, don’t just increase risk — they also expose a threat that has been hiding in plain sight for years. According to the AFP’s 2025 survey, 79% of organizations reported experiencing payment fraud in 2024.

Trade war pressures are now throwing fuel on the fire. Fraudsters are already weaponizing generative AI to impersonate vendors, reroute payments and slip through onboarding workflows. Now, as the chaos intensifies, they’re finding it even easier to blend in.

What Fraud Looks Like Today

It is no secret that cybercriminals have an end goal: a pay day. To get there, they use every available tool at their disposal, and the most common weapon in their arsenal is social engineering. According to Nasdaq, invoice and payment fraud now costs United States businesses over $100 billion annually. 

A textbook scheme for cybercriminals is vendor impersonation and payment redirection. In these attacks, fraudsters either gain access to an account or create a fake account from a vendor that their target does business with. After establishing communications with their target, they will then send fake invoices and provide updated fraudulent bank information, rerouting the target company’s payment to their own account when the invoice is paid. 

The city of Baltimore became a victim of such an attack when a hacker stole $1.5 million in a vendor impersonation attack in March. According to reports, the threat actor made contact in the fall of 2024 and built trust with city departments using publicly available information to impersonate an employee of one of their vendors. After gaining credibility, they infiltrated the city’s IT systems and changed the vendor’s banking information — redirecting funds to their own account.

On a weekly basis, I see this same scenario play out firsthand with the companies I work with. Recently, I spoke to a business that was one click away from paying a $1.2 million invoice to a group of fraudsters. This company had all the top-of-the-line security tools and proper internal controls in place. But their vendor did not. 

The vendor’s CEO had their email compromised, and the hacker lurked undetected — eventually finding a real $1.2 million invoice and bank details. They then used this data to trick the vendor’s bank into creating a real (but fraudulent) account. The attacker submitted a bank wire change request with the new info, which was sent to the target company. The request passed all internal checks. All it needed was one signature — and the money would have been gone.

Now take their scenario and place it in today’s chaotic climate, where businesses are rapidly switching third-party vendors in response to the looming trade war. There’s no baseline for interactions between the organization and its new supplier, which makes it far easier for attackers to easily and successfully impersonate vendors. 

How to Protect Against This Heightened Threat

No matter what the trade war headlines are next week, month or year, one thing is clear: vendor and payment fraud is already on the rise — and it’s becoming more effective by the day. And these days, with the added volatility of shifting global trade dynamics, businesses must urgently shore up the growing risk of vendor and payment fraud — especially as they continue to adjust supplier relationships to navigate the current economic landscape.

To fight back against this new wave of fraud, companies must go beyond surface-level fixes. Organizations must: 

  • Train teams across departments. Keep finance, procurement, and security aligned and informed on the latest tactics.
  • Automate and verify onboarding. Use tools that enforce multi-level approval, detect inconsistencies, and reduce blind spots between teams.
  • Leverage AI to flag suspicious behavior. Behavioral AI can catch anomalies across vendors, payment patterns, and workflows— long before money moves.
  • Secure the full payment process, end-to-end. Fraud doesn’t start or stop with a single email or invoice. Companies need full visibility and protection from onboarding through approval to final payment execution. 

To stay ahead, business leaders must rethink their vendor risk models and modernize their security stack — not just to survive trade disruption, but to prevent irreversible losses. Those that align finance, procurement and security teams will outpace those who don’t. And rather than panic, organizations can use this volatile period to build resilient, fraud-resistant systems that set them up for long-term success.

KEYWORDS: fraud fraud prevention fraud trends

Share This Story

Shai gabay headshot

Shai Gabay is CEO and Co-Founder at Trustmi. Image courtesy of Gabay

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing