Your Bids and Payment Schedules Are Already Exposed
Construction is one of the most targeted industries for wire fraud because of large payment amounts, complex subcontractor relationships, and reliance on email for payment instructions. Bid databases, permit records, and project directories give attackers everything they need to impersonate your subcontractors and redirect draw payments.
Get Your Construction Threat ReportTop Threats Facing Construction
Subcontractor Payment Diversion
Attackers identify active subcontractors from permit filings and project directories, then impersonate them with updated bank details timed to coincide with scheduled draw payments.
Bid Manipulation and Intelligence Theft
Public bid tabulations and plan rooms expose your pricing strategy. Competitors or attackers access sealed bid data through compromised plan room accounts to undercut proposals.
Change Order Fraud
Project details from building permits and public meeting minutes enable attackers to fabricate realistic change orders referencing actual scope modifications discussed in public record.
Equipment and Material Procurement Fraud
Project plans filed with municipalities reveal material specifications, enabling fraudulent purchase orders sent to your vendors from spoofed email addresses.
What Attackers Find When They Research Construction Companies
These publicly available sources become attack intelligence in the wrong hands.
Municipal Permit Databases
Building permits list the general contractor, project value, scope of work, and sometimes the full subcontractor list with contact information.
Public Bid Tabulations
Post-award bid tabs reveal your pricing on line items, bonding capacity, and competitive positioning for future bid manipulation.
Project Tracking Sites (Dodge, ConstructConnect)
Construction intelligence platforms aggregate project details, timelines, and contractor assignments that attackers use to time their fraud attempts.
Surety Bond Records
Publicly filed payment and performance bonds reveal project values, surety relationships, and bonding capacity — indicators of cash flow timing.
Example: How an Attacker Targets Construction
Draw Payment Redirect via Subcontractor Impersonation
An attacker pulls the subcontractor list from a municipal building permit for your $14M school project. They register a domain one character off from your electrical subcontractor's email and send a "bank change" notice to your AP department two days before the scheduled $340K progress payment. The email references the correct project name, contract number (from the bid tab), and draw schedule. The payment goes to a mule account.
See What Attackers Already Know About Your Construction Organization
AiVERSARY scans the same sources attackers use and translates your public exposure into a defense roadmap. $499 per report.
Get Your Threat Report