Vendor Email Compromise Targeting Indian Firms

Verdict: Suspicious | Risk Score: 8/10 | Severity: high

Category: UPI

How Vendor Email Compromise Targeting Indian Firms Works

Overview: Vendor Email Compromise (VEC) scams are on the rise in India, especially among mid-large companies with extensive supplier and vendor networks. In this scam, cybercriminals target both vendors and the companies they serve, compromising genuine business relationships to misdirect payments. These scams are dangerous because they use authentic-looking email threads and vendor details, making them hard to detect and resulting in huge financial losses. How It Works: Fraudsters first hack or spoof a vendor’s official email account, often after weeks of reconnaissance. Once inside, they monitor ongoing payment discussions. When a legitimate invoice or payment is due, the attacker inserts a new message, claiming the vendor’s bank details have changed and providing a new (fraudulent) account. To add pressure and credibility, a follow-up email from someone impersonating a company executive (often the CEO or CFO) endorses the change and instructs immediate payment. The finance team, trusting both sources, processes the transfer to the scammer’s account. India Angle: Indian cities like Mumbai and Delhi, with their dense networks of global suppliers, are common targets. The scam leverages local business culture, where decisions are sometimes rushed at the end of quarters or financial years. The integration of UPI and direct bank transfers for business payments increases risk, as money can move fast and irreversibly. Staff responsible for vendor payments or accounts payable are most at risk, especially if procedures for verification are weak. Real Examples: A Bengaluru firm receives an email—from a trusted vendor—stating their bank account has changed, attaching an “updated contract.” Minutes later, a message appears from the CFO’s account (actually spoofed), urging the finance team to process the invoice to the new account immediately for “GST compliance.” Funds are transferred, and the vendor later disputes not receiving payment. Red Flags: 1. Sudden requests to change bank account or payment instructions for regular vendors 2. Emails about payment updates endorsed by executives, bypassing normal verification 3. Attachments labelled as “updated contracts” or “new terms” from unfamiliar sources 4. Urgent payment requests at odd hours or end of financial periods Protective Measures: Always verify any change in vendor payment details by calling the vendor or using secure messaging channels that were previously agreed upon. Implement a two-person approval process for new payment instructions. Educate your team to watch for seemingly routine requests that are unusually urgent or out of character. Use strong email security practices like enabling multi-factor authentication and monitoring for suspicious logins. If Victimised: Immediately notify your bank to attempt a reversal, contact the involved vendors, and report the incident at cybercrime.gov.in or call 1930. Let your leadership team and IT department know so they can assess any further risks or breaches. Related Scams: Similar patterns can be seen in CEO whaling scams (fraudulent executive requests for payment) and supply chain invoice frauds (fake invoices for non-existent orders sent to finance teams).

How This Scam Works — Detailed Explanation

Vendor Email Compromise (VEC) scams have become alarmingly prevalent among Indian firms, particularly targeting mid to large enterprises with complex supplier networks. Cybercriminals often initiate their schemes by identifying companies through social media platforms like LinkedIn, where executives and employees frequently share their professional information. Once they discover a target, these criminals attempt to gain access to the email accounts of either the vendor or the company itself. They might employ phishing techniques, sending fake emails that appear to be from genuine sources within the organization. This impersonation grants them the ability to surveil conversations, learning the language and details that make their next steps more convincing.

Fraudsters utilize sophisticated psychological tricks to manipulate employees into making quick decisions. By creating a sense of urgency—perhaps by mimicking an executive's writing style and sending emails that convey immediate payment obligations—they exploit the natural inclination of employees to comply with requests from higher-ups. They may also employ social engineering tactics, such as responding to previous email threads or using names of actual vendors to give a façade of legitimacy. The emails can include unexpected alterations to payment details or bank accounts, persuading victims to change their usual procedures, all under the illusion of a legitimate operational update.

For instance, a finance manager at a reputable firm may receive an email purportedly from a trusted vendor—complete with a copied chain of communication. The email could mention a sudden change in banking details due to an 'internal policy shift' and requests immediate action for a pending invoice. Once the unsuspecting manager implements these changes, funds are diverted to accounts controlled by the criminals. This type of scam has led to significant losses across India, with reports indicating that companies have lost hundreds of crores to VEC scams just in 2023 alone. The Reserve Bank of India (RBI) and the Ministry of Home Affairs (MHA) have recognized this threat, alerting organizations to be vigilant. Additionally, the Computer Emergency Response Team (CERT-In) has issued advisories detailing how such scam activities operate.

The impact of these scams isn't merely financial; they erode trust within business relationships and can lead to severe reputational damage for the companies involved. Victims often find themselves in a systemic crisis, needing to contact banks to reverse transactions, which—if too late—may not be possible. Furthermore, the emotional toll on employees, who may blame themselves for the oversight, can hinder productivity and lead to unfavorable work environments. The combination of pressure and poor response options often leaves victims feeling helpless. Companies that are defrauded must navigate the process of notifying law enforcement, informing stakeholders, and reassessing their security protocols, all while trying to maintain client relationships.

Identifying VEC scams before they strip your business of assets is crucial. Regular correspondence changes such as unexplained modifications to vendor bank details, emergency emails requesting immediate action from high-level executives, and communication that occurs at odd hours should raise red flags. Look out for attachments with new or unusual terms that demand quick acceptance. Always validate any rapid requests for payment changes with a direct phone call to the vendor or executive involved, ensuring that systems remain secure against these manipulative tactics. By setting up internal controls and promoting continuous security training among employees, companies can play a proactive role in mitigating these risks before disaster strikes.

Visual Intelligence:

BharatSecure's AI has identified this as a used in scams targeting Indian users.

Who Does Vendor Email Compromise Targeting Indian Firms Target?

General public across India

Red Flags — How to Identify Vendor Email Compromise Targeting Indian Firms

  • Unexplained changes to bank details for regular vendors
  • Executive-level email pushing immediate payment changes
  • Attachments with unusual or new terms/contracts
  • Payment update emails sent at odd hours or near financial deadlines

What To Do If You Encounter Vendor Email Compromise Targeting Indian Firms

  1. Report suspicious activities directly to the Cybercrime Helpline by calling 1930 or visiting cybercrime.gov.in.
  2. Verify any email requesting payment changes by contacting the vendor through an alternate communication channel.
  3. Educate all employees about the signs of Vendor Email Compromise scams and encourage them to report anything suspicious.
  4. Implement dual verification processes for financial transactions, involving multiple stakeholders.
  5. Regularly update and secure email accounts with strong passwords and two-factor authentication.
  6. Monitor transaction patterns and account statements for any unauthorized changes or discrepancies.

How to Report Vendor Email Compromise Targeting Indian Firms in India

  • Call 1930 — National Cyber Crime Helpline (24x7)
  • File a complaint at cybercrime.gov.in
  • Contact your bank immediately if money was lost
  • Call RBI helpline: 14440 for banking fraud

Frequently Asked Questions

What to do if I shared my bank details in a Vendor Email Compromise scam?
Immediately contact your bank’s helpline and report the incident. For HDFC, dial 1800-202-6161, and for SBI, 1800-11-1109. Notify them of the potential fraud.
How can I identify a Vendor Email Compromise scam?
Look for sudden changes in payment details from vendors, emails requesting urgent action from higher management, or communication sent during odd hours.
How do I report this type of scam in India?
You can report scams by calling the Cybercrime Helpline at 1930 or by visiting cybercrime.gov.in. It's also advisable to notify your bank about any fraudulent activity.
How can I recover my money or protect my account after falling victim to this scam?
Contact your bank immediately to halt any further transactions and discuss potential recovery options. Also, file a report with the Cybercrime Helpline and follow up on assigned case status.

Verify Any Suspicious Message

Check any suspicious message, link, or call for free at bharatsecure.app. BharatSecure uses AI to detect scams in real-time and protect Indian users.