PFPT Us TR State of The Phish 2024
PFPT Us TR State of The Phish 2024
2024 State of
the Phish
Risky actions, real-world threats
and user resilience in an age of
human-centric cybersecurity
proofpoint.com
2024 STATE OF THE PHISH \ REPORT
INTRODUCTION
Imagine a successful cyberattack against your organization.
What does it look like? Maybe it involves a fiendishly clever
piece of social engineering—a convincing lure that catches the
recipient off guard. Or maybe it would take a smart technical
exploit to get past your defenses. But in reality, threat actors
don’t always have to try that hard.
Often, the easiest way to breach security is to exploit the human factor.
People are a key part of any good defense, but they can also be the most
vulnerable. They may make mistakes, fall for scams or simply ignore
security best practices. According to this year’s State of the Phish survey,
71% of working adults admitted to taking a risky action, such as reusing
or sharing a password, clicking on links from unknown senders, or giving
credentials to an untrustworthy source. And 96% of them did so knowing
that they were taking a risk.
When obliged to choose between convenience and security, users pick the
former almost every time. So, what can organizations do to change this? In
this report we’ll take a closer look at how attitudes towards security manifest
in real-world behavior, and how threat actors are finding new ways to take
advantage of our preference for speed and expedience. We’ll also examine
the current state of security awareness initiatives, as well as benchmarking
the resilience of people and organizations against attack.
The foundation of this report is a survey of 7,500 end users and 1,050 security
professionals, conducted across 15 countries. It also includes Proofpoint
data derived from our products and threat research, as well as findings
from 183 million simulated phishing messages sent by our customers over
a 12-month period and more than 24 million emails reported by our customers’
end users over the same period.
2
2024 STATE OF THE PHISH \ REPORT
TABLE OF CONTENTS
4 Key Findings 20 Organizational
Benchmarks
6 Security Behaviors 21 Industry failure rate
and Attitudes
6 End-user behavior and attitudes 27 Conclusion
10 Security Awareness
Trends
10 Current state of security awareness
12 Areas for improvement
3
2024 STATE OF THE PHISH \ REPORT
KEY FINDINGS
Over 1 million
attacks are launched with MFA-bypass framework
EvilProxy every month, but 89% of security professionals
still believe MFA provides complete protection against
account takeover.
66 million
BEC attacks were detected and blocked
on average per month by Proofpoint.
69%
of organizations
were infected
by ransomware.
4
2024 STATE OF THE PHISH \ REPORT
of security
of users either
professionals said
weren’t sure or
10 million
Microsoft continues to be the
most abused brand, with
58% of users who took risky actions engaged in behavior that would have
made them vulnerable to common social engineering tactics.
5
2024 STATE OF THE PHISH \ REPORT
6
2024 STATE OF THE PHISH \ REPORT
Users took risky actions for a variety of reasons: convenience, time saving and
urgency being the most common answers. But a small cohort of 2.5% took risky
actions purely out of curiosity. Either way, the message is clear: people aren’t
taking risky actions because they lack security awareness. Often, users know
what they are doing when they take risks and are quite willing to gamble with
organizational security.
It is convenient 44%
39% To save time
Nobody knows this better than the world’s cybercriminals. They understand
that people can be exploited, either through negligence, obliviousness or—in
rare instances—malice. Social engineering is a part of almost every email threat
analyzed by our researchers. And 58% of users who took a risky action said
they engaged in behavior that would put them at risk of basic social engineering
tactics, such as clicking on unknown links, responding to unfamiliar senders
and sharing credentials with untrustworthy sources. These actions can lead to
ransomware infection, malware, data breach or financial loss.
7
2024 STATE OF THE PHISH \ REPORT
One of the reasons users take these risks is a lack of consensus about
accountability and responsibility. Only 41% of users said they know that they
bear responsibility for cybersecurity at their workplace. About 7% claimed that
they aren’t responsible at all, while the majority (52%) weren’t sure.
This contrasts with the view among security professionals, 85% of whom say
that most employees know they are responsible for security. This gap between
perception and reality suggests that there is a need for clearer communication
about shared responsibility, rather than just more training on security best
practices and policies.
8
2024 STATE OF THE PHISH \ REPORT
VIPs, executives
34%
This overlap suggests that users may be taking some of these actions because
they are unaware of just how risky they are considered by security teams.
9
2024 STATE OF THE PHISH \ REPORT
Only specific 6%
individuals 15%
Not sure 1%
1% 2023 2022
10
2024 STATE OF THE PHISH \ REPORT
30 minutes or less
6% 25%
31–59 minutes
17% 37% 1–2 hours
The types of tactics being used are evolving, too, with a 23% increase in the use
of contests and prizes to gamify and incentivize attention. This change can help
increase user engagement and motivation, while also creating a positive and fun
learning environment. Computer-based training remains the most common format
(45%), but other methods such as simulated USB drops, videos, posters and
newsletters are also being used.
Cybersecurity-based contests
In-person training sessions 37% 33%
and prizes
Internal cybersecurity
Simulated phishing attacks 34% 30%
chat channel
However, only 34% of respondents say they perform simulated phishing attacks,
despite the high volume of malicious email seen in the threat landscape. This
suggests that there is still room for improvement in the composition of most
security awareness training syllabuses.
11
2024 STATE OF THE PHISH \ REPORT
83%
According to our survey, security professionals believe that more training,
tighter controls, closer business alignment, better rewards and stronger
championing of security initiatives would all be effective in improving security.
of surveyed security However, fewer than a third of organizations reward positive user behaviors
professionals implement or champion security initiatives. These are important ways to recognize
more training to drive and reinforce good security practices, and to ensure that all employees are
behavior change invested in creating a security-aware culture.
Rank Actions
Risks Taken User Actions
Motivation
81%
implement more controls
Top Considered
by Security Pros
by Infosec
Top Risky
Taken by Users
In contrast, users overwhelmingly say that they want security to be made easier.
They want processes to be more user-friendly, convenient and transparent, and
they want to have more communication and feedback from security experts. Users
overwhelmingly agree (94%) that improving ease of use would motivate them to
be more attentive to security. These disparities between security team actions and
user motivations clearly demonstrate the need for open communication between
security teams and end users.
12
2024 STATE OF THE PHISH \ REPORT
In keeping with trends we’ve observed over the past few years, punishing unwanted
behavior was considered the least effective approach by security professionals.
Fortunately, it was also the least implemented. Punishment can have negative
effects, such as creating fear, resentment and distrust, and reducing motivation and
morale. It can also discourage users from reporting incidents or seeking help, which
can seriously increase the risk of security breaches. Punishment was also the least
motivating response among end users, though 71% still agreed that this would be
an incentive for them. This suggests that some users may be willing to comply with
security rules to avoid negative consequences, though it is unlikely that compelled
participation will lead to enduring behavior change.
13
2024 STATE OF THE PHISH \ REPORT
Threat prevalence
Some of the most common forms of attack reported by survey participants were
phishing, business email compromise (BEC) and ransomware. While each of
these techniques is distinct, security teams will often encounter them as individual
components of an extended attack chain, with phishing leading to ransomware,
or a supply chain attack leading to BEC.
Prevalence of Attacks
2023 2022
However, these aren’t the only threats that users and organizations need to be
aware of. According to our own data, many novel attack types are becoming
increasingly prominent.
14
2024 STATE OF THE PHISH \ REPORT
Growing threats:
TOAD, MFA-Bypass, QR codes and generative AI
In telephone-oriented attack delivery (TOAD), the malicious message
often appears to be completely benign, containing nothing more than
a phone number and some erroneous information. It isn’t until the
unsuspecting victim calls the listed number for help that the attack
chain is activated. Cybercriminal call centers are operating around
the world, guiding victims into granting remote access, revealing
sensitive information and credentials, or even infecting themselves
with malware. Our data reveals that an average of 10 million TOAD
messages are sent every month.
13 million
Proofpoint saw over 13M
corporate cybersecurity. These attacks typically use proxy servers to intercept MFA
tokens, allowing attackers to circumvent the additional layer of security provided by
one-time codes and biometrics. Several off-the-shelf phish kits now include MFA
bypass functionality, allowing even relatively unsophisticated attackers to benefit.
TOAD attacks at peak in
We see around 1 million phishing threats using the popular EvilProxy framework
August 2023
every month. This is of particular concern, as 89% of security professionals still
consider MFA to be a silver bullet for protection against account takeover, with 84%
of respondents saying their organizations use MFA to prevent account takeover.
89%
of security pros believe that MFA
9% 42%
Completely agree
Somewhat agree
Completely disagree
And within the paradigm of traditional phishing, attackers are finding new ways to
embed malicious content. In recent months we’ve seen an increase in the use of
QR codes as an alternative to links or attachments. This technique is particularly
dangerous, as it both attempts to evade automated detection while presenting
users with a familiar format in a context they may not have seen before. It is also
impossible to tell just by looking if a QR code leads to a phishing site or malware
download. Unfamiliar users scanning a QR code may not even be aware that
they’ve engaged with a piece of malicious content until it’s too late.
15
2024 STATE OF THE PHISH \ REPORT
It’s also worth noting that even the least common type of attack—USB drop—
was still reported by 60% of respondents. This shows that cybercriminals are
willing to try any tactic, old or new, if they think it will give them a chance to exploit
an unsuspecting victim.
16
2024 STATE OF THE PHISH \ REPORT
68
20 million
Office 365 was the most abused
Microsoft product in malicious
email, with over 20 million email 9.4 8.8
6.1 4.4
threats using the brand 3.5 3.1
15% Unsure
One of the ways that organizations try to mitigate the risk and impact of cyberattacks
is by purchasing cyber insurance, which covers the costs and damages associated
with a cybersecurity incident. Among those that had experienced a ransomware
incident, 96% now have cyber insurance. Most insurers (91%) helped with ransom
payments, up from 82% the year before. However, globally, the rate of payment to
ransomware attackers has declined from 64% to 54%.
54%
64%
58%
17
2024 STATE OF THE PHISH \ REPORT
The number of respondents who regained access to their data after paying also
declined, with the number who regained access after a single payment seeing the
largest decline. This may be one explanation for the drop in payments. Another
possible reason is that organizations are becoming more aware of the drawbacks
and risks of paying ransoms, such as encouraging more attacks, funding criminal
activities or receiving corrupted or incomplete data.
Attack consequences
The impact of phishing attacks on organizations can be devastating, both
financially and reputationally. 71% of organizations experienced at least one
successful phishing attack in 2023, down from 84% in 2022. However, while the
incidence of successful phishing attacks has declined, some of the negative
consequences have soared. Year on year, we saw a 144% increase in reports
of financial penalties, such as regulatory fines, and a 50% increase in reports of
reputational damage due to phishing incidents.
18
2024 STATE OF THE PHISH \ REPORT
73%
Loss of data / intellectual property Advanced persistent threat
32% 23%
33% 21%
of organizations reported Ransomware infection * Direct financial loss **
a BEC attack, but only 32% 22%
43% 30%
29%
teach users about
Breach of customer / client data
29%
44%
Financial penalty ***
9%
22%
19
2024 STATE OF THE PHISH \ REPORT
Organizational Benchmarks
One of the ways that organizations can measure and improve
their cybersecurity awareness and resilience is by conducting
phishing simulations. Proofpoint phishing simulations mimic
real-world phishing scenarios and assess how users respond
to them. Our customers conducted 183 million phishing
simulations over a 12-month period. Of these, link-based tests
were the most common, accounting for 59% of all simulations,
followed by data-entry tests (30%) and attachment-based tests
(10%). However, attachment-based tests had the highest failure
rate overall, at 17%. Failure rates for all types of simulations
were within 1 percentage point of last year’s results.
30%
27%
17% 16%
11% 12% 10% 8%
3% 4%
We also analyzed failure rates by industry and found some interesting patterns.
The finance industry saw the most improvement, with failure rates decreasing
by 7 percentage points, from 16% in 2022 to 9% in 2023. On the other hand, the
agriculture and construction industries both saw their failure rates increase by
3 percentage points from last year. Although this increase is relatively small, it
may point to an underlying issue with security approaches in these industries.
20
2024 STATE OF THE PHISH \ REPORT
Healthcare 8% 9% -1%
Legal 8% 8% 0%
Government 9% 9% 0%
Environmental 10% 8% 2%
21
2024 STATE OF THE PHISH \ REPORT
18.3%
of simulated phishing emails
Rank Top Risks Considered
Subject
by Infosec
Top Risky Actions
Failure Rate
Taken by Users
were properly reported 1 Microsoft: Microsoft password expiration 4%
by users in 2023, a slight
increase from 2022 Microsoft: Microsoft deactivation of old
2 10%
OneDrive account
Overall, the reporting rates for simulated phishing increased slightly to 18.3%, from
17% in 2022. This means that slightly more users reported the phishing emails
they received to their IT or security team, rather than ignoring or deleting them.
Reporting rates are an important indicator of user awareness and engagement, as
they show that users can recognize and flag suspicious messages.
22
2024 STATE OF THE PHISH \ REPORT
Legal Other
8 11
22 17
2.7 1.6
Insurance Construction
9 12
23 18
2.5 1.5
Marketing/Advertising Agriculture
6 11
13 15
2.1 1.4
Electronics Transportation
8 11
15 15
2.1 1.4
Engineering Automotive
10 11
18 15
1.9 1.3
Manufacturing Telecommunications
9 12
17 15
1.9 1.3
Technology Mining
10 11
18 14
1.8 1.3
Environmental Entertainment/Media
10 12
18 13
1.7 1.1
Retail Education
7 10
12 9
1.7 1
23
2024 STATE OF THE PHISH \ REPORT
Overall failure rates for simulated phishing dropped to 9.3%, from 10% in 2022.
This means that fewer users clicked on links, entered their credentials on fake
websites or opened attachments. Failure rates are an important indicator of
user vulnerability and risk, as they show how likely users are to fall for a real
phishing attack.
2.0
users who report phishing emails than users who fail them, and vice versa.
The average Resilience Factor increased to 2.0 in 2023, from 1.7 in 2022.
This number has been creeping up over the past three years, starting at 1.5
Organizations’ Resilience Factor in 2021, indicating that organizations are becoming more resilient to phishing
rose to 2.0 in 2023, the third attacks as their users become more aware and proactive.
straight yearly increase
Avg. Reporting Rate Avg. Failure Rate Resilience Factor
2023 2022
18% ÷ 9% =
reporting rate failure rate
2
resilience factor
24
2024 STATE OF THE PHISH \ REPORT
Not every reported email is, in fact, malicious. So we also benchmark real-world
reporting accuracy for customers who use our PhishAlarm reporting button.
By this measure, the education, technology and legal sectors ranked best,
with tech improving significantly from the year before. Still, more than half of
reported emails were false positives; in some sectors, than number was close
to 80%. Without an automated way to verify all those reported emails as true
threats, it adds up to hours upon hours of needless work by security teams.
9.3%
43% 26%
42% 31%
Technology Automotive
of simulated phishing emails 39% 26%
28% 27%
got users to click in 2023, Legal Hospitality/Leisure
a slight decrease from 2022 39% 26%
38% 28%
Marketing/Advertising Insurance
35% 25%
34% 31%
Government Retail
31% 25%
32% 26%
Other Electronics
31% 24%
33% 28%
Consulting Transportation
30% 23%
31% 28%
Construction Agriculture
29% 23%
32% 26%
Entertainment/Media Aerospace
28% 22%
30% 27%
Telecommunications Mining
28% 28% 22%
27% 21%
Manufacturing Environmental
27% 21%
30% 26%
Real Estate
27%
30% 2023 2022
25
2024 STATE OF THE PHISH \ REPORT
~2 million
unique threats were found in
Top Risks
Threat Considered
Family
by Infosec
Unique
Top RiskyThreats
by by
Taken
Actions Reported
EndUsers
Users 2023
email reported by end users Credential Phishing 930,707
last year
Malware 52,646
Banking 15,700
Botnet 2,735
RAT 4,531
Downloader 3,513
Stealer 2,779
MalSpam 6,161
Keylogger 2,170
Backdoor 74
Ransomware 167
TOAD 54
Payment Fraud 4
Others 876,773
Total 1,898,650
This shows that while the variety of phishing and malware attacks are increasing,
people empowered with the right knowledge and right skills can proactively
help keep organizations safe. User-reported data is a valuable source of threat
intelligence that security teams can use to better understand their adversaries,
and to boost security education with real-world examples. And the data from
these user reports also feeds back into our threat detections, raising the tide for
all boats.
26
2024 STATE OF THE PHISH \ REPORT
Conclusion
A security awareness program should be an essential component
of any organization’s security strategy, but by itself it isn’t enough.
Our data shows that 96% of people who took a risky action knew
that what they were doing might be risky, so it seems that key
information is getting through. However, knowing what to do and
doing it are two different things. The challenge is now not just
awareness, but behavior change.
Users say they want security to be made easier for them, and they’re right to
want that. But in those instances where processes can’t be made any easier
and a choice remains between convenience and security, users still need to be
convinced to choose correctly.
This will help users to understand the nature, scope and impact of the threats they
face, and will help security teams tailor their program and messaging accordingly.
To use threat intelligence effectively, organizations should:
27
2024 STATE OF THE PHISH \ REPORT
• Track where security controls create bottlenecks and work to alleviate them.
Anything that slows down system performance, interrupts user workflows or
requires multiple steps should be a candidate for review. These bottlenecks
can reduce productivity and efficiency and make users more likely to bypass
security controls altogether. Using the latest technology can help create a
light-touch environment that minimizes disruption. For example, data loss
prevention (DLP) solutions can help by monitoring authorized senders and
recipients without getting in the way.
• Ease of use and automation should be prioritized, coupled with best-in-class
security education, threat prevention, detection and response technology.
By applying these principles and taking an integrated multilayered platform
approach, organizations can not only better defend against the constantly
changing threat landscape, but also reduce the cognitive load and effort users
have to expend to follow security rules.
Go beyond training
28
LEARN MORE
To learn more about how Proofpoint provides insight into your user-based risks and helps you mitigate them
with a people-centric cybersecurity strategy, visit proofpoint.com..
ABOUT PROOFPOINT
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions,
Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including
75 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
More information is available at www.proofpoint.com.
©Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners.
0400-015-01-01