The inherent complexity, speed and secrecy across the acquisitions process makes this landscape particularly lucrative for threat actors.