Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface
    Cybersecurity

    The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

    adminBy adminApril 24, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    BEC by Type
    Share
    Facebook Twitter LinkedIn Pinterest Email

    You can no longer recognize a phishing email by simply counting the typos. And you will get caught if you simply respond to a genuine-looking email without thinking.

    Analysis of almost 800,000 email attacks across more than 4,600 organizations shows attackers moving away from exploiting technical vulnerabilities in favor of targeting behavioral and organizational weaknesses. In short, email attackers are now targeting their victims with tailored tactics that exploit trusted relationships and routine workflows.

    The three primary email attack methods are phishing, business email compromise (BEC) and vendor email compromise (VEC). Phishing remains predominant, accounting for 58% of all attacks. BEC comprises 11% of attacks, while VEC (a subtype of BEC) accounts for more than 60% of all BEC attacks. Details are provided in Abnormal AI’s 2026 Attack Landscape Report.

    Phishing varies by target. 

    File-sharing lures are concentrated on industries and roles where document exchange is common and expected. Brand impersonation aligns with the complexity of the target’s software footprint. In both cases, the lure is designed to blend into the workflows and tools that employees use. “The same structures, workflows, and relationships that define how an organization operates also define where an attack can blend in undetected,” says the report.

    More than 20% of phishing attacks use redirect chains to obscure the final malicious page from both users and their security tools. Just over 10% of these use link shorteners, with tinyurl (31.6%) and t.co (26.6%) dominating. Tinyurl is a free service, while t.co is automatically and freely applied by X/Twitter to outbound links. In both cases the URL can appear legitimate and security teams are reluctant to impose automatic blocks.

    Advertisement. Scroll to continue reading.

    BEC is less frequent, involves more attacker craftsmanship, and is more impactful.

    BEC and VEC are less frequent but potentially more impactful than phishing. (BEC targets employees within an organization, while VEC relies on a compromised vendor account to then target the vendor’s customers or suppliers.)

    In BEC, VIP impersonation is used in 43% of attacks at small enterprises, but only 7% at large enterprises. Lateral attacks within an organization, where one compromised account targets another account, is the reverse: less than 1% at small organizations rising to more than 23% in large organizations. Noticeably, higher education is especially susceptible to such lateral attacks, where 33% of the BEC attacks are lateral, “Highlighting,” writes Abnormal, “how open, high-turnover environments create ideal conditions for internal spread.”

    BEC by Type
    Image Credit: Abnormal AI

    The precise methodology used in a BEC attack changes with the size of the company: lateral compromise is effectively nil in small companies, increasing with the size of the company; while VIP/executive impersonation decreases with the size of the company.

    Nearly 40% of all BEC attacks exploit the trust employees place in colleagues, executives, and internal departments. Forty-five percent of these attacks impersonate a named non-executive colleague. Generic impersonations (“the fake IT helpdesk notice, the HR benefits update, the payroll system alert”) follow at 36.7%. These succeed, comments Abnormal, “Because employees are conditioned to act on communications from internal systems without scrutinizing who actually sent them.”

    The VEC subtype of BEC is now more common than BEC personal impersonation itself. Invoice fraud dominates VEC in North America, accounting for 42% of VEC campaigns. In EMEA procurement-stage pretexts dominate at 41% of campaigns, demonstrating that geographic business practices are incorporated into attack methodologies.

    “What makes VEC especially difficult to defend against is that billing and payments are a routine part of the vendor-customer relationship, discussed over email every day. Consequently, malicious messages seemingly from vendors requesting changes to banking information or large fund transfers may not be immediately flagged as suspicious,” warns Abnormal.

    What is very clear from Abnormal’s analysis is that the old hap-hazard typo-strewn ungrammatical email attack is now assigned to the bin of history. Today we have finely targeted attack campaigns targeting common workflows with sophisticated pretexts and evasion. The report makes no mention of criminal use of AI being used in this new quality of attack (it would be impossible to quantify), but it is undoubtedly an important element.

    The report does, however, clearly suggest that defensive use of AI can help defend against this quality of attack. “Closing that gap requires AI that analyzes identity, context, and content to build behavioral baselines for every employee and vendor in an enterprise’s cloud environment. That’s what makes it possible to flag the moments when an attack tries to pass as business as usual—before an employee ever has the opportunity to engage.”

    What is source for the goose must definitely be used as source for the gander.

    Attack behavioral newest relationships Shift Surface Trusted
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThis 98-inch Google TV just dropped to a jaw-dropping price that’s impossible to ignore
    Next Article Ubuntu is winning against Windows as Framework’s bestselling laptop
    admin
    • Website

    Related Posts

    Regular Password Resets Aren’t as Safe as You Think

    April 24, 2026

    Vulnerabilities Patched in CrowdStrike, Tenable Products

    April 24, 2026

    China-Backed Hackers Are Industrializing Botnets

    April 24, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google spam reports with personally identifying information won’t be used and processed

    April 24, 2026

    I stopped switching to a terminal to run scripts once I found VS Code’s task runner

    April 24, 2026

    Regular Password Resets Aren’t as Safe as You Think

    April 24, 2026

    Google Won’t Act On Spam Reports If They Contain Personal Information

    April 24, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,485)
    • Privacy & Online Earning (181)
    • SEO & Digital Marketing (912)
    • Tech Tools & Mobile / Apps (1,771)
    • WiFi / Internet & Networking (243)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google spam reports with personally identifying information won’t be used and processed

    April 24, 2026

    I stopped switching to a terminal to run scripts once I found VS Code’s task runner

    April 24, 2026

    Regular Password Resets Aren’t as Safe as You Think

    April 24, 2026
    Most Popular
    • Google spam reports with personally identifying information won’t be used and processed
    • I stopped switching to a terminal to run scripts once I found VS Code’s task runner
    • Regular Password Resets Aren’t as Safe as You Think
    • Google Won’t Act On Spam Reports If They Contain Personal Information
    • How to Sell on ChatGPT with WooCommerce (Agentic Guide)
    • Vulnerabilities Patched in CrowdStrike, Tenable Products
    • The Pixel 10’s new display filter is fantastic, except for two big flaws
    • China-Backed Hackers Are Industrializing Botnets
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.