CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Shift in Email-Based Threats: Behavioral and Relationship Exploitation Now Dominant in Phishing, BEC, and VEC Campaigns

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Analysis of nearly 800,000 email attacks across 4,600+ organizations reveals a significant shift in attacker tactics from exploiting technical flaws to targeting behavioral and organizational trust within workflows. Email-based threats now rely on finely tailored social engineering, leveraging trusted relationships, routine operations, and evasive pretexts to bypass detection. Phishing remains the most prevalent method (58%), while Business Email Compromise (BEC) and its subtype Vendor Email Compromise (VEC)—now comprising over 60% of BEC attacks—deliver higher impact despite lower volume. Attackers exploit predictable workflows such as file-sharing, invoicing, and internal communications, using redirect chains (over 20% of phishing) and popular URL shorteners (e.g., TinyURL, t.co) to conceal malicious destinations. Geographic targeting is evident, with invoice fraud dominating VEC in North America and procurement-stage pretexts prevailing in EMEA.

Timeline

  1. 23.04.2026 14:06 1 articles · 3h ago

    Email threat landscape evolves: Behavioral and relationship exploitation now account for over 70% of attacks

    Analysis covering 793,500 email attacks across 4,600+ organizations shows attackers shifting from technical exploits to behavioral and organizational trust abuse in phishing, BEC, and VEC campaigns. Key findings include the dominance of redirect chains in phishing (20%+) using URL shorteners like TinyURL and t.co, and the rise of VEC as a dominant BEC subtype—especially in invoice fraud in North America and procurement pretexts in EMEA. BEC tactics stratify by organization size: small enterprises see high rates of VIP impersonation (43%), while large organizations and higher education experience elevated lateral compromise (up to 33%). Nearly 40% of BEC attacks impersonate named colleagues or generic internal departments to exploit conditioned trust.

    Show sources

Information Snippets