What is a supply chain attack via email? A supply chain attack via email involves attackers first hacking a supplier or partner, then using their account to send file shares that trick employees into logging into fake pages. The attack often bypasses MFA through a technique called AiTM (Adversary-in-the-Middle).

The attack thus starts with an external party. It could be your accounting consultant, marketing agency or another supplier who has access to documents or other shared communication.
When the external account is hacked, it is used to share files via e.g. SharePoint, OneDrive, Dropbox or similar. What makes this approach so effective is that the notifications are often genuine and come from legitimate senders. The document is often customised with filenames like "Updated contract" or "Project plan". An employee is asked to log in to view the file and in this way grants access even with MFA activated.
"When criminals combine automation with modern AI tools, they can carry out attacks that previously would have required many hours of manual work. Now they analyse email history, understand relationships and generate credible files and filenames in seconds. With these tools, they attack everything and everyone, all the time," says Gaute Meland, Senior IT Operations Consultant, Nordlo Bergen
When the user logs in to view the file, the critical moment occurs: the attacker copies the session information in real time. For the employee, the login looks completely normal, even with two-factor authentication enabled. The attacker takes over a valid session and gains the same access as the user.
"AiTM does not undermine MFA itself; it exploits the fact that the user trusts a login window that looks completely genuine. As long as we have to be able to log in somewhere, there will always be a way in for attackers. Therefore, technical measures must be combined with training," continues Gaute Meland.

When attackers have a valid session, they can read and send emails in the user's name, set up hidden forwarding rules, change payment information in ongoing transactions, and use the account to spread the attack further, both internally and to your customers and partners.
The activity often resembles legitimate use, which also means it can take weeks before someone discovers the intrusion. The longer the attacker has access, the greater the damage.
The defence must be twofold, both human and technical.
On the human side, it's about creating a culture where employees dare to question what they see on the screen. This requires training and an open environment. Show concrete examples of how attacks can look and how they can verify unexpected sharing when suspecting intrusion attempts.
On the technical side, there are several layers that together create stronger protection.
"Many organisations already have security functionalities they do not fully utilise. When good technical measures are combined with employees who know what to look for, you are much stronger against this kind of attack," concludes Gaute Meland.
Nordlo can map your vulnerabilities and deliver a prioritised action plan, from technical setup to ongoing monitoring and training of employees.

Cyberattack via supplier: How hackers bypass MFA and steal access
