CASE FILE // PC-2026-04
Status: Open


Filing 03.03.00Field 27 APR 2026Classification PublicStatus Open

Phishing cost in manufacturing: vendor BEC, production downtime, and the OT pivot

Average breach cost $5.08M (IBM 2025). The cost profile is driven by vendor BEC wire-fraud across supplier-chain handoffs and by production-downtime cost when phishing-initiated ransomware reaches OT systems. CMMC compliance layer for defence-industrial-base manufacturers.

Exhibit A

The manufacturing phishing risk profile


Manufacturing phishing breach cost sits at $5.08M average per IBM 2025, materially above the cross-sector mean of $4.88M. The drivers are different from healthcare or finance. Per-record cost is only $168 because manufacturing data per record carries lower regulatory liability than PHI or PCI. The total figure is driven instead by two structural factors: vendor BEC wire-fraud succeeds at scale because manufacturing supplier chains contain dozens to hundreds of vendor relationships per facility, and production-downtime cost dominates the disruption line whenever a phishing-initiated ransomware event reaches factory-floor systems.

The sector also faces an unusual operational-technology pivot risk that does not exist in services-sector phishing analysis. A successful phishing attack against a manufacturing IT environment can pivot into the OT environment that controls factory-floor equipment. The Norsk Hydro 2019 case (LockerGoga ransomware delivered via phishing, $70M+ damage primarily through aluminium-production disruption) and the Colonial Pipeline 2021 case (DarkSide ransomware, $4.4M ransom paid, downstream fuel-supply disruption across the US East Coast) are the canonical references. Both involved a phishing-initiated IT compromise that pivoted to OT impact. The OT-pivot cost line is the single largest variance between manufacturing breach modelling and services-sector breach modelling.[IBM 2025 manufacturing cohort + Norsk Hydro 2019 disclosure + Colonial Pipeline 2021 disclosure]

Exhibit B

Why vendor BEC dominates the manufacturing loss line

DECLASSIFIED

The single largest dollar-loss category in manufacturing phishing is vendor BEC: the variant of business email compromise where the attacker spoofs or compromises a known supplier mailbox and redirects an invoice payment. The category dominates manufacturing loss for three structural reasons.

First, the volume of legitimate vendor payments is high. A typical mid-market manufacturer processes hundreds of vendor invoices per month from dozens of distinct suppliers; a large manufacturer can process thousands of invoices monthly across hundreds of suppliers. The high baseline volume of legitimate vendor-payment transactions creates a high-noise environment where a single fraudulent invoice with redirected banking details is hard to spot. The accounts-payable team's job is to process invoices quickly, not to perform forensic verification on every one.

Second, the supplier relationships are frequently long-lived but loosely-secured. A supplier mailbox compromise upstream of the manufacturer is invisible to the manufacturer's own security controls. The compromised supplier sends what appears to be a routine invoice from a known address; the manufacturer has no signal that the supplier's mailbox has been taken over. The attacker can sit inside the supplier's mailbox for weeks observing payment-cycle timing before triggering the fraudulent invoice.

Third, the wire-fraud recovery rate is unfavourable. By the time the manufacturer's accounts-payable team or the supplier discovers the fraud, the funds have typically already cleared and been moved through mule accounts. Manufacturing-sector wire-fraud recovery rates run approximately 25 to 35 percent gross, in line with the broader BEC recovery picture. The single highest-leverage control (see /by-attack/bec) is an out-of-band confirmation procedure on any banking-detail change, applied to every supplier regardless of payment size.[IBM 2025 + IC3 2024 vendor-BEC category + ACFE 2024 occupational-fraud report]

Exhibit C

The OT-pivot anatomy: from email click to production halt


The OT-pivot path is the manufacturing phishing risk that has no parallel in other sectors. The pattern works as follows. A phishing email lands in the IT environment, the recipient clicks, the attacker establishes initial access on the IT side. The attacker then enumerates the environment looking for paths from IT to OT, which in many manufacturing facilities are surprisingly direct because the historical air-gap between IT and OT has eroded as plant operators have integrated production systems with corporate ERP, MES, and analytics platforms.

Once the attacker has reached OT, the options are several. Ransomware deployment against OT systems takes production offline directly. Selective destruction of OT control logic (the TRITON / TRISIS pattern, 2017) targets safety-instrumented systems. Encryption of plant historian and recipe databases (the LockerGoga pattern at Norsk Hydro) makes resuming production technically possible but operationally difficult because the operators no longer know what recipe or batch was in progress. Each variant has produced 9-figure damage in published cases.

The defender remediation is structural: network segmentation between IT and OT, with strictly-controlled flows through identified gateway systems; OT-specific endpoint detection and response (Claroty, Dragos, Nozomi-class); and a clear incident-response playbook for OT-impact events that is distinct from the IT-incident playbook. Many mid-market and small manufacturers have not deployed these controls and remain exposed to direct pivot from a phishing click to a production halt within hours.[Dragos 2024 ICS year-in-review + CISA ICS advisories 2023-2025 + Norsk Hydro public disclosure]

Exhibit D

Cost-line build-up against the $5.08M figure


Cost lineShare of $5.08MDollar figureDriver
Direct wire / vendor-invoice loss27%$1.37MVendor BEC dominant; see /by-attack/bec
Production-downtime cost22%$1.12MOT-pivot or IT-driven plant shutdown
Incident response + forensics14%$711KIT and OT IR engagements may run parallel
Customer-disclosure + contract-loss10%$508KTier-1 customer disclosure requirements
Notification + monitoring8%$406KLower than services sectors
OT-system rebuild + recovery7%$356KWhere OT was impacted
Legal + class-action exposure6%$305KLower than services because per-record liability is lower
Insurance-premium increase4%$203KManufacturing cyber-insurance has hardened materially
Awareness + control rebuild2%$102KOne-time post-event

The production-downtime line is the largest variance from services-sector breach modelling. Per-hour downtime cost ranges widely from $5K (small mid-market manufacturer) to $8M (semiconductor fab) and the aggregate-during-event downtime cost can dominate the total event-cost line.[IBM 2025 manufacturing cohort + Dragos 2024 industry impact analysis]

Exhibit E

CMMC, ITAR, and the defence-industrial-base layer


For manufacturers in the US defence-industrial base, the regulatory layer adds Cybersecurity Maturity Model Certification (CMMC) and International Traffic in Arms Regulations (ITAR) compliance requirements on top of the general manufacturing baseline. CMMC 2.0, effective in late 2024 with rolling implementation through 2025-2027, requires Level 2 certification for most handlers of Controlled Unclassified Information (CUI). Level 2 maps to NIST SP 800-171 controls and includes mandatory phishing-defence elements: MFA across the workforce, security-awareness training, incident-response capability, and supply-chain risk management.

The CMMC certification process is itself a cost line. Third-party assessment for Level 2 runs approximately $50K to $250K depending on organisation size and existing maturity, with re-assessment every three years. Failure to certify by required dates results in contract ineligibility, which for many defence-industrial-base manufacturers represents existential business risk. The compliance investment is therefore not optional and the post-incident remediation cost includes the work to restore CMMC compliance posture after a phishing-initiated breach.

ITAR violations carry their own enforcement layer with civil penalties up to $1.2M per violation and criminal penalties for wilful violations. A phishing-initiated breach that exposes ITAR-controlled technical data triggers parallel notification and remediation obligations. Defence-industrial-base manufacturers therefore face a triple-stack regulatory exposure (general breach notification + CMMC + ITAR) that mid-market commercial manufacturers do not.[32 CFR Part 170 (CMMC) + 22 CFR Part 120-130 (ITAR) + DoD CMMC AB guidance 2024-2025]

Exhibit F

The control stack: vendor verification, OT segmentation, IR playbook


#1Out-of-band confirmation on vendor banking-detail changes

~65% of vendor-BEC wire-loss
Cost: $0 tooling, policy work

Hard rule: any change to a supplier's payment bank account must be confirmed by a phone call to a previously-known number, not the number on the email. Applied to every supplier regardless of payment size. Cheapest, highest-leverage single control.

#2IT-OT network segmentation with monitored gateway

~70% of OT-pivot risk
Cost: 6-18 months of network-engineering work

Strict segmentation between IT and OT environments, with all flows passing through monitored gateway systems. The single most-leveraged control against the OT-pivot ransomware pattern that drove the Norsk Hydro and Colonial Pipeline event costs.

#3Phishing-resistant MFA across IT workforce

~90% of credential-pivot value
Cost: $50 per user one-time

FIDO2 hardware-key MFA across IT, finance, and engineering populations. Mandatory under CMMC Level 2. The control whose absence enabled the initial-access step in most published manufacturing ransomware cases.

#4OT-specific endpoint detection-and-response

~50% of OT-impact event severity
Cost: $50K to $500K per facility

Claroty, Dragos, Nozomi-class OT detection deployed across factory-floor systems. Detects unusual OT-protocol traffic patterns characteristic of attacker reconnaissance and lateral movement inside the OT environment.

#5IR playbook with OT-specific response

~40% of OT-impact recovery time
Cost: $50K to $250K one-time + annual exercise

OT-incident response is operationally distinct from IT-incident response: safety-system integrity must be confirmed before restart, plant-operator authority and IT-operator authority frequently differ, regulatory notification timelines may be parallel. Pre-built playbook compresses the recovery window.

#6Supplier-portal with multi-party banking-change approval

~85% of vendor-banking-change BEC
Cost: $50K to $200K one-time

Banking-change requests are processed through a supplier portal that requires multi-party approval and out-of-band verification. Eliminates email-driven banking-change requests entirely for major vendors.

Exhibit G

Frequently filed questions

ON RECORD

What is the average phishing-related breach cost in manufacturing?[open]

$5.08M average per IBM 2025. Driven by vendor BEC wire-fraud and production-downtime cost rather than per-record liability.

What is the OT-pivot risk?[open]

The risk that a phishing-initiated IT compromise pivots into operational-technology systems controlling factory floor equipment. The Norsk Hydro 2019 and Colonial Pipeline 2021 cases are the canonical references.

What is the per-hour production-downtime cost?[open]

$5K (small mid-market) to $8M (semiconductor fab). Automotive assembly $1-2M per hour. Pharmaceutical $500K-$1.5M per hour. Aggregate during-event downtime cost frequently dominates the total breach total.

Does CMMC apply to my manufacturing operation?[open]

If you handle Controlled Unclassified Information in a US Department of Defense context, yes. CMMC 2.0 Level 2 is required for most CUI handlers with rolling implementation through 2025-2027.

What is the dominant phishing loss vector?[open]

Vendor BEC. Successful supplier-mailbox compromise enables fraudulent invoices with redirected banking details. The volume of legitimate vendor-payment transactions creates a high-noise environment where fraud is hard to spot.

How does the supplier-side compromise reach my AP team?[open]

The attacker compromises the supplier's mailbox upstream of you, sits inside observing payment-cycle timing for weeks, then sends what appears to be a routine invoice from a known address but with redirected banking details. Your security controls have no visibility into the supplier's mailbox.

What is the single highest-leverage control?[open]

An out-of-band confirmation procedure on every vendor banking-detail change, applied to every supplier regardless of payment size. Zero tooling cost, ~65% reduction in vendor-BEC wire-loss.

Updated 2026-04-27