Despite years of warnings about the danger they pose to organizations’ data, phishing attacks remain a major cybersecurity concern. According to Verizon’s 2023 Data Breach Investigations Report, phishing was seen in 36 percent of recorded breaches, up from 25 percent the previous year.
Artificial intelligence tools allow attackers to generate phishing campaigns on a huge scale, though those technologies can also be used to detect phishing attacks.
Phishing has long been understood as the sending of email that attempts to convince the recipient to do something that the attacker wants, such as to transfer money, send a password or provide other data, notes Jon France, CISO for (ISC)², a nonprofit cybersecurity association.
Phishing emails purport to be from legitimate-sounding sources and are used to either get information directly from the recipient or get them to click on a link or download an attachment that can then execute code for data exfiltration or other malicious purposes.
Phishing and its derivatives continue to be the most prevalent source of ransomware attacks noted by security company IDC’s research, according to Research Director Jennifer Glenn.
“The reason is simply that it is fairly easy for an attacker to execute,” Glenn says. “Contact information, such as email and phone numbers, are regularly provided — mostly willingly — by users to various organizations for marketing, registration for events, shipping and purchases, and even travel.” That data is sometimes sold but is also often stolen by malicious actors, who then turn around and use it for phishing attacks.
Phishing has morphed and is no longer confined to just email, as attackers now use voicemail (vishing) and SMS text messages (smishing) to lure would-be victims.
Click the banner to learn the signs of a phishing attack before it escalates.