11 ways cybercriminals are making phishing more potent than ever

11 ways cybercriminals are making phishing more potent than ever

  • 25.03.2025 14:00
  • csoonline.com
  • Keywords: AI, Phishing

Cybercriminals enhance phishing with AI, impersonation, QR codes, and trusted services, making attacks harder to detect. Organizations must adapt their security strategies to address these evolving threats.

Microsoft ReportsMicrosoft Services

Estimated market influence

Abnormal Security

Negativesentiment_dissatisfied
Analyst rating: N/A

Abnormal Security reported a campaign where attackers used spoofed Microsoft ADFS login pages to harvest credentials and bypass MFA.

Arup

Negativesentiment_dissatisfied
Analyst rating: N/A

The Hong Kong subsidiary of engineering firm Arup was defrauded of $25.6 million due to a phishing attack involving deepfakes.

Barracuda

Negativesentiment_dissatisfied
Analyst rating: N/A

Barracuda reported on Phishing-as-a-Service (PhaaS) platforms, including Tycoon 2FA and Sneaky 2FA, which are used for credential theft and MFA bypassing.

CSO Online

Positivesentiment_satisfied
Analyst rating: N/A

CSO Online published an article detailing the evolution of phishing tactics, highlighting contributions from cybersecurity experts.

Huntress

Negativesentiment_dissatisfied
Analyst rating: N/A

Huntress warned about attackers using trusted services and QR codes in phishing campaigns to bypass security filters.

JLStock

Neutralsentiment_neutral
Analyst rating: N/A

JLStock provided an image for the article but is not involved in cybersecurity activities.

KnowBe4

Negativesentiment_dissatisfied
Analyst rating: N/A

KnowBe4 reported a 98% increase in phishing campaigns using Russian .ru domains for credential harvesting.

Recorded Future

Negativesentiment_dissatisfied
Analyst rating: N/A

Recorded Future highlighted the use of generative AI and image-based phishing to bypass email security filters.

Razorblue

Negativesentiment_dissatisfied
Analyst rating: N/A

Razorblue noted the effectiveness of QR code-based phishing, particularly on mobile devices with less security oversight.

Sophos

Neutralsentiment_neutral
Analyst rating: N/A

Sophos commented on the temporary nature of QR code phishing and shifts to other formats like SVG files.

ThinkCyber Security

Negativesentiment_dissatisfied
Analyst rating: N/A

ThinkCyber Security discussed the use of 'zombie' email threads and generative AI in enhancing phishing authenticity.

Ulster University

Neutralsentiment_neutral
Analyst rating: N/A

Ulster University's Kevin Curran provided insights on the use of generative AI in phishing emails.

Yubico

Neutralsentiment_neutral
Analyst rating: N/A

Yubico's Niall McConachie commented on the increasing sophistication of cybercriminals using AI for voice and video deepfakes.

Context

Analysis: Cybercriminals Enhancing Phishing Techniques - Business Insights and Market Implications

Key Findings and Business Insights:

1. Generative AI in Phishing

  • Fact: Cybercriminals are leveraging generative AI to create more convincing phishing emails, mimicking legitimate brand communications.
  • Impact: This reduces detection rates and increases the effectiveness of phishing campaigns.
  • Statistic: WormGupt and ProjectKali are examples of tools using AI to generate spearphishing emails with near-perfect mimicry.

2. Voice and Video Cloning

  • Fact: AI is being used to clone voices and create deepfakes, enabling convincing impersonation attacks.
  • Impact: This technique bypasses traditional trust mechanisms, making it harder to detect phishing attempts.
  • Example: A Hong Kong subsidiary of Arup was defrauded of $25.6 million due to such attacks.

3. Resurrected Email Threads

  • Fact: Cybercriminals are reviving old email threads using generative AI to make them appear more authentic.
  • Impact: This increases the believability of phishing emails, making detection harder.

4. ClickFix Attacks

  • Fact: A new technique involves sending emails with links prompting users to execute SQL commands to "fix" issues.
  • Impact: This method is increasingly used to deliver malware like Lumma Stealer and NetSupport.
  • Statistic: The ClickFix technique has been observed in 17% of all attacks bypassing native spam filters.

5. Brand Impersonation

  • Fact: Attackers are spoofing trusted brands like Microsoft, DocuSign, and ADFS to trick users into entering credentials.
  • Impact: These attacks exploit user trust in familiar brands, leading to credential theft and MFA bypasses.
  • Statistic: Abnormal Security reported a significant rise in such campaigns.

6. Abusing Trusted Services

  • Fact: Attackers are using legitimate document-signing and file-hosting services to distribute phishing lures.
  • Impact: This technique bypasses security systems, making it harder for users to detect malicious content.

7. QR Code-Based Phishing

  • Fact: QR codes are being embedded in emails to direct users to credential-harvesting sites or exploit-loaded websites.
  • Impact: The use of QR codes is growing due to their perceived trustworthiness and ability to bypass email filters.
  • Statistic: 17% of attacks that bypass native spam filters now use QR codes, with 89% targeting credentials.

8. Image-Based Phishing

  • Fact: Attackers are crafting images to mimic text-based emails, bypassing traditional email security filters.
  • Impact: This technique is evolving to avoid detection and remains a significant threat.

9. Russian Fronts and Domain Abuse

  • Fact: A 98% rise in phishing campaigns using Russian .ru domains has been reported.
  • Impact: These domains are often hosted on "bullet-proof" providers, making takedowns difficult.

10. AI-Assisted Intelligence Gathering

  • Fact: Cybercriminals are using AI to gather intelligence from social media and other sources.
  • Impact: This enables highly personalized and targeted phishing attacks, increasing their success rate.

11. Phishing-as-a-Service (PhaaS)

  • Fact: PhaaS platforms offer subscription-based tools for launching advanced phishing campaigns, including MFA code theft.
  • Impact: These platforms lower the barrier to entry for cybercriminals, enabling more widespread attacks.
  • Example: Tycoon 2FA and Sneaky 2FA are prominent PhaaS tools used in attacks.

Market Implications:

1. Increased Sophistication of Threats

  • The use of generative AI, deepfakes, and PhaaS indicates a shift toward more professionalized cybercrime.
  • Businesses must invest in advanced threat detection systems and employee training programs to stay ahead.

2. Growing Demand for Cybersecurity Solutions

  • The rise in sophisticated phishing techniques is likely to drive demand for AI-based detection tools, behavioral analytics, and secure authentication solutions.
  • Companies offering innovative cybersecurity products will have a competitive edge.

3. Shifts in Competitive Dynamics

  • Cybercriminals are becoming more agile and adaptive, forcing cybersecurity firms to innovate rapidly.
  • Businesses must continuously update their security frameworks to counter evolving threats.

4. Long-Term Effects on Trust

  • The increasing sophistication of phishing attacks may erode user trust in digital communication channels.
  • Organizations will need to focus on rebuilding trust through transparent security practices and robust compliance measures.

5. Regulatory Implications

  • Governments may introduce stricter regulations to combat cybercrime, potentially impacting business operations and requiring additional compliance investments.

Strategic Considerations for Businesses:

  1. Invest in AI-Powered Detection Tools: Use generative AI to detect and counter phishing attempts.
  2. Enhance Employee Training: Regularly simulate advanced phishing scenarios to build resilience against social engineering tactics.
  3. Monitor Trusted Services: Closely track third-party vendors and services that could be exploited by attackers.
  4. Leverage Multi-Factor Authentication (MFA): Implement robust MFA solutions to mitigate risks associated with credential theft.
  5. Stay Updated on Threat Intelligence: Monitor emerging trends in phishing techniques and adapt security strategies accordingly.

Conclusion:

The evolution of phishing tactics, driven by AI and PhaaS, poses significant challenges for businesses. While cybercriminals are becoming more sophisticated, the market also presents opportunities for cybersecurity firms to innovate and provide solutions. Businesses must adopt proactive measures to mitigate risks and protect their assets in an increasingly digital landscape.