CIO Influence
CIO Influence News Security

Average Organization Integrates 379 Third-Party Applications Into Email Environment

Average Organization Integrates 379 Third-Party Applications Into Email Environment, According to New Research From Abnormal Security

Social engineering attacks also continue to grow, with BEC attacks increasing by 55% and nearly half of all organizations receiving at least one VEC attack since January

Abnormal Security, the leading behavioral AI-based email security platform, released its H2 2023 Email Threat Report, revealing how email attacks have increased in both sophistication and volume since the start of the year.

Read More About Cioinfluence Interview: CIO Influence Interview with Michael Berthold, CEO at KNIME

“And with the rise of generative AI tools like ChatGPT to help craft these emails, it’s only getting easier for threat actors to keep scaling their attacks in sophistication and in volume.”

Examining data since 2013, Abnormal identified a massive increase in third-party applications (apps) integrated with email, underscoring the proliferation of an emerging threat vector that cybercriminals are exploiting as they continue to shift their tactics.

The number of integrated third-party apps continued to rise in the first half of 2023 (between January and June), during which time Abnormal also observed overall increases in business email compromise (BEC) and vendor email compromise (VEC) attacks, continuing a trend that has persisted over the last five years.

Connected Third-Party Applications Are Growing, Increasing Undue Risk

Abnormal’s research showed that the average organization integrates 379 third-party apps with email—a 128% increase since 2020. And for large enterprises with 30,000+ employees, the number of integrated third-party apps shoots up to 3,973, on average. These include apps for collaboration, productivity, development, social networking, security, and more.

“So many of today’s organizations lack visibility into connected third-party apps within their email environment, and attackers are taking note,” said Mike Britton, chief information security officer at Abnormal. “Historically, cybercriminals relied on sending credential phishing links via inbound email to access and compromise accounts. But as more security leaders began locking down this ‘front door’ with solutions to detect those malicious messages, attackers have adapted their tactics. Now, they’re increasingly targeting email ‘side doors’ via third-party app integrations to compromise accounts and read emails undetected.”

Across the integrated third-party applications, 37% have high-risk permissions, such as the ability to create and delete emails or users, and even reset user passwords. Britton continued, “These findings show us just how important it is for security teams to understand which apps are connected to email and what permissions they’ve been assigned. Understanding risk is the first step in ongoing efforts to manage security posture.”

Latest Cioinfluence Interview: CIO Influence Interview with Joe Ramieri, VP of North America at Instabase

BEC and VEC Attack Volumes Continue to Increase

The report also showed a rise in both BEC and VEC attacks in the first half of 2023. BEC attacks increased by 55% over the previous six months, and nearly half (48%) of all organizations received at least one VEC attack during that same time frame.

Additional findings from the first half of the year include:

  • 34% increase in VEC attacks over the previous two halves.
  • BEC attacks outpaced malware in a reversal of findings from the previous half.
  • Large organizations are especially at risk. There is a 90%+ chance of receiving at least one BEC attack and a 76% chance of receiving at least one VEC attack each week for organizations with 5,000+ mailboxes.
  • The technology industry is the most popular target for BEC attackswhile advertising/marketing is the most popular target for VEC attacks. Other popular targets for BEC attacks include construction, advertising/marketing, finance, transportation, and media/entertainment.

“The fact that BEC and VEC attacks are continuing to grow—despite more security awareness and continued advancements in legacy security tools—shows us that email is still one of the easiest ways to infiltrate organizations,” said Britton. “And with the rise of generative AI tools like ChatGPT to help craft these emails, it’s only getting easier for threat actors to keep scaling their attacks in sophistication and in volume.”

Britton continued, “The report’s findings reveal a concerning combination of threats that is making email an increasingly vulnerable target. Between emerging threat vectors like connected third-party apps, and persistent attack tactics like BEC and VEC, one thing is clear: there are more surfaces to protect, and organizations need to have their bases covered.”

Browse The Complete Interview About Cioinfluence: CIO Influence Interview with Filip Verloy, Field CTO for the EMEA Region at Noname Security

 [To share your insights with us, please write to sghosh@martechseries.com] 

Related posts

Lenovo Study: Three in Five CIOs Would Replace Half or More of Their Current Technology If Given Opportunity

BCS Insurance Company Broadens Cybersecurity Solutions Through Partnership With Risk Placement Services and Paladin Cyber

CIO Influence News Desk

Hoonartek Achieves Premier Tier Partner Status with Snowflake

PR Newswire