版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
REPORT
2024StateofthePhish
Riskyactions,real-worldthreatsanduserresilienceinanageofhuman-centriccybersecurity
2024STATEOFTHEPHISH\REPORT
INTRODUCTION
Imagineasuccessfulcyberattackagainstyourorganization.Whatdoesitlooklike?Maybeitinvolvesafiendishlycleverpieceofsocialengineering—aconvincinglurethatcatchestherecipientoffguard.Ormaybeitwouldtakeasmarttechnicalexploittogetpastyourdefenses.Butinreality,threatactorsdon’talwayshavetotrythathard.
Often,theeasiestwaytobreachsecurityistoexploitthehumanfactor.Peopleareakeypartofanygooddefense,buttheycanalsobethemostvulnerable.Theymaymakemistakes,fallforscamsorsimplyignoresecuritybestpractices.Accordingtothisyear’sStateofthePhishsurvey,71%ofworkingadultsadmittedtotakingariskyaction,suchasreusingorsharingapassword,clickingonlinksfromunknownsenders,orgivingcredentialstoanuntrustworthysource.And96%ofthemdidsoknowingthattheyweretakingarisk.
Whenobligedtochoosebetweenconvenienceandsecurity,userspicktheformeralmosteverytime.So,whatcanorganizationsdotochangethis?Inthisreportwe’lltakeacloserlookathowattitudestowardssecuritymanifestinreal-worldbehavior,andhowthreatactorsarefindingnewwaystotakeadvantageofourpreferenceforspeedandexpedience.We’llalsoexaminethecurrentstateofsecurityawarenessinitiatives,aswellasbenchmarkingtheresilienceofpeopleandorganizationsagainstattack.
Thefoundationofthisreportisasurveyof7,500endusersand1,050securityprofessionals,conductedacross15countries.ItalsoincludesProofpointdataderivedfromourproductsandthreatresearch,aswellasfindingsfrom183millionsimulatedphishingmessagessentbyourcustomersovera12-monthperiodandmorethan24millionemailsreportedbyourcustomers’endusersoverthesameperiod.
2
2024STATEOFTHEPHISH\REPORT
TABLEOFCONTENTS
4KeyFindings
6SecurityBehaviorsandAttitudes
6 End-userbehaviorandattitudes
10SecurityAwarenessTrends
10 Currentstateofsecurityawareness
12 Areasforimprovement
14TheThreatLandscape
Threatprevalence
Growingthreats:TOAD,MFA-Bypass,QRcodesandgenerativeAI
BECattacksbenefitfromAI
Microsoftremainsmost-abusedbrand
Ransomwarestillamajorconcern
Attackconsequences
20OrganizationalBenchmarks
21 Industryfailurerate
27Conclusion
3
2024STATEOFTHEPHISH\REPORT
KEYFINDINGS
Over1million
attacksarelaunchedwithMFA-bypassframeworkEvilProxyeverymonth,but89%ofsecurityprofessionalsstillbelieveMFAprovidescompleteprotectionagainstaccounttakeover.
71 and 96
ofuserstooka
riskyaction
ofthemknewtheywere
doingsomethingrisky
66million
BECattacksweredetectedandblockedonaveragepermonthbyProofpoint.
oforganizationswereinfectedbyransomware.
69
4
2024STATEOFTHEPHISH\REPORT
85
ofsecurityprofessionalssaidthatmostemployeesknowtheyareresponsibleforsecurity,but
10million
59
Microsoftcontinuestobethe
mostabusedbrand,with
68million
ofuserseitherweren’tsureorclaimedthatthey’renotresponsibleatall.
TOADmessagesaresenteverymonth.
maliciousmessagesassociatedwiththebrandoritsproducts.
58
ofuserswhotookriskyactionsengagedinbehaviorthatwouldhavemadethemvulnerabletocommonsocialengineeringtactics.
5
SecurityBehaviorsandAttitudes
Eventhebesttechnicaldefensescanbeunderminedifusersdon’tdothebasics,suchasavoidingsuspiciouslinks,verifyingthesender’sidentityandsettingastrongpasswordandkeepingittothemselves.However,manyusersfailtofollowthesesimplerules,puttingthemselvesandtheirorganizationsatrisk.
End-userbehaviorandattitudes
Accordingtooursurvey,71%ofuserssaidtheytookariskyactionandalmostallofthem—96%—didsoknowingly.Amongthatgroup,73%saidthey’dtakentwoormoreriskyactions.Andmorethanathirdoftheriskstheytookwereratedbythoseusersaseither“extremelyrisky”or“veryrisky.”
RiskyActionsTaken
29%
26%
26%
24%
20%
19%
16%
13%
11%
10%
9%
29%
Useworkdeviceforpersonalactivities
Reuseorsharepassword
ConnectwithoutusingVPNatapublicplace
Respondtoamessage(emailorSMStext)fromsomeoneIdon’tknow
Accessinappropriatewebsite
ClickonlinksordownloadattachmentsfromsomeoneIdon’tknow
Shareworkdevicewithfriendsorfamily
Callanunfamiliarphonenumberinanurgentemail
Tailgating:allowotherstoentertheofficewithoutbadgingin
Uploadsensitivedatatounproventhird-partycloud
Givecredentialstountrustworthysource
Havenevertakenariskyaction
30% 25% 20% 15% 10% 5% 0%
Userstookriskyactionsforavarietyofreasons:convenience,timesavingandurgencybeingthemostcommonanswers.Butasmallcohortof2.5%tookriskyactionspurelyoutofcuriosity.Eitherway,themessageisclear:peoplearen’ttakingriskyactionsbecausetheylacksecurityawareness.Often,usersknowwhattheyaredoingwhentheytakerisksandarequitewillingtogamblewithorganizationalsecurity.
WhyRiskyActionisTaken
44%
Itisconvenient
24%
Tomeetanurgentdeadline
11%
Toachievearevenuetarget
5%
Other,pleasespecify
Tosavetime
19%
39%
Tosavemoney
10%
Tomeetotherperformanceobjectives
Nobodyknowsthisbetterthantheworld’scybercriminals.Theyunderstandthatpeoplecanbeexploited,eitherthroughnegligence,obliviousnessor—inrareinstances—malice.Socialengineeringisapartofalmosteveryemailthreatanalyzedbyourresearchers.And58%ofuserswhotookariskyactionsaid
theyengagedinbehaviorthatwouldputthematriskofbasicsocialengineeringtactics,suchasclickingonunknownlinks,respondingtounfamiliarsendersandsharingcredentialswithuntrustworthysources.Theseactionscanleadtoransomwareinfection,malware,databreachorfinancialloss.
Oneofthereasonsuserstaketheserisksisalackofconsensusaboutaccountabilityandresponsibility.Only41%ofuserssaidtheyknowthattheybearresponsibilityforcybersecurityattheirworkplace.About7%claimedthattheyaren’tresponsibleatall,whilethemajority(52%)weren’tsure.
PerceptiononSecurityResponsibility
41vs.85
7vs.13
52vs.2
Yes–Employeesthinktheyareresponsibleforsecurity
No–Employeesbelievesecurityisnottheirresponsibility
Notsure
Employees
SecurityProfessionals
63
ofsecurityprofessionals
rateduserswithaccesstocriticalbusinessdataasthetopcybersecurityrisk
Thiscontrastswiththeviewamongsecurityprofessionals,85%ofwhomsaythatmostemployeesknowtheyareresponsibleforsecurity.Thisgapbetweenperceptionandrealitysuggeststhatthereisaneedforclearercommunicationaboutsharedresponsibility,ratherthanjustmoretrainingonsecuritybestpracticesandpolicies.
Theprofessionalview
Securityprofessionalsunderstandablyhaveadifferentperspectiveonsecurityriskstoendusers.Theyaremoreawareofthethreatlandscapeandtheconsequencesofabreach.Andtheyhave
amorenuancedunderstandingofthechallengesthatgointosecuringcomplexanddynamicenvironments.Theyalsohavetheunenviabletaskoffindingwaystobalancetheneedforsecuritywiththeneedforunhinderedproductivityandefficiency.
Accordingtooursurveyofsecurityprofessionals,theyrateuserswithaccesstobusiness-criticaldataasthebiggestsecurityrisk(63%)—agroupthatisinevitablyhardtomanage,asmuchofthataccessisnecessary.Butclick-happy
usersandthosewhodon’tcompletesecurityawarenesstrainingareclosebehindinjointsecondplace(56%each).Thesecategoriesofuserwereallconsideredsignificantlymoreriskythanexecutives/VIPs(34%),despitethelattergroupoftenhavingbroadaccesstovaluabledata.
UsersWhoRepresentRisk
Userswhohavebusinessprivilegeandaccesstocriticaldata
Userswhoareclickhappy
Userswhoconsistentlyfailtocompletetrainingassignment
Suppliersorbusinesspartners
Peoplewhoareleaving
42%
VIPs,executives
34%
49%
56%
56%
63%
Unfortunately,oursurveyrevealssignificantoverlapbetweentheriskiestbehaviorsidentifiedbysecurityprofessionalsandthemostcommonriskyactionstakenbyendusers.Reusingpasswords,usingworkdevicesforpersonalactivitiesandaccessinginappropriatewebsitesareamongbehaviorsconsideredthemostunsafe;allofthemappearedinthetopactionstakenbyusers.
Rank
TopRisksConsideredbyInfosec
TopRiskyActionsTakenbyUsers
1
ClickonlinksordownloadattachmentsfromsomeoneIdon’tknow
Useworkdeviceforpersonalactivities
2
Reuseorsharepassword
Reuseorsharepassword
3
Accessinappropriatewebsite
ConnectwithoutusingVPNatapublicplace
4
Uploadsensitivedatatounproventhird-partycloud
Respondtoamessage(emailorSMStext)fromsomeoneIdon’tknow
5
Useworkdeviceforpersonalactivities
Accessinappropriatewebsite
Thisoverlapsuggeststhatusersmaybetakingsomeoftheseactionsbecausetheyareunawareofjusthowriskytheyareconsideredbysecurityteams.
SecurityAwarenessTrends
Whiletrainingaloneisn’tenoughtochangeunsafebehavior,teamsthatlackbasicsecurityawarenesstoolsandknowledgearestillmuchmorelikelytofallpreytocybercriminals.But
asnewsocialengineeringluresandtechniquesappearonthethreatlandscape,awarenessprogramsmustbeagileandbroad-basedtoremainrelevant.
Currentstateofsecurityawareness
Firstsomepositivenews:99%ofrespondentssaidtheyhaveasecurityawarenessprogramofsomesortupandrunning.Butwhilethebasicsmayalreadybeinplace,manyarestrugglingtodriverealbehavioralchange.Apossiblereasonforthisisthatonly53%saytheytraineveryoneintheorganization(downfrom56%lastyear).Thismeansthatsomeusersmaybeleftoutoftheloopormayreceiveinadequateoroutdatedtraining.
SecurityAwarenessActivitiesAssignment
Everyoneintheorganization
28%
Onlyspecificdepartmentsandroles
6%
Onlyspecificindividuals
Notsure 1%
1%
15%
41%
2023
53%
2022
56%
Anotherchallengeisthecoverageandrelevanceoftrainingtopics.Securityprofessionalsagreethatremotework,passwordhygieneandinternetsafetyarecritical,butlessthanathirdofsecurityawarenessprogramscoverallthese
topics.Thetoptrainingtopicscitedbyrespondentsweremalware,Wi-Fisecurity,ransomwareandemailphishing,whichareallimportant,butnotsufficient
toaddressthefullspectrumofrisks.Andaswe’llseelaterwhenweexaminethelatestcybercriminaltacticsandtechniques,emergingthreatscanquicklybecomecommonplace,takingunpreparedusersbysurprise.
41 from28
Thepercentageoforganizations
thattrainedspecificrolesjumpedyearoveryear
Onthepositiveside,thesurveyshowssomesignsofimprovementandinnovationinsecurityawarenesstactics.Yearoveryear,trainingofspecificrolesanddepartmentshasrisensignificantly(41%from28%),indicatingamoretailoredandtargetedapproach.Timeallocatedtousereducationhasalsoincreasedyearoveryear,withmorerespondentsdedicatingoverthreehoursperyeartoawarenesstraining.Overall,theaverageamountoftimededicatedtoawarenesstraininghasincreasedforthefirsttimeinthreeyears.
TimeAllocatedforSecurityAwarenessActivities
6 25
17 37
15
30minutesorless31–59minutes
1–2hours
3–4hours
Morethan4hours
Cybersecurity-basedcontestsandprizes
33%
Smishingandvishingsimulations
33%
SimulatedUSBdrops
23%
Internalcybersecuritychatchannel
30%
Internalwiki
23%
Mycompanydoesnothaveasecurityawarenessprogram
1%
Thetypesoftacticsbeingusedareevolving,too,witha23%increaseintheuseofcontestsandprizestogamifyandincentivizeattention.Thischangecanhelpincreaseuserengagementandmotivation,whilealsocreatingapositiveandfunlearningenvironment.Computer-basedtrainingremainsthemostcommonformat(45%),butothermethodssuchassimulatedUSBdrops,videos,postersandnewslettersarealsobeingused.
In-persontrainingsessions
37%
Virtual,instructor-ledtraining
34%
Computer-basedtraining
45%
Simulatedphishingattacks
34%
Awarenesspostersandvideos
31%
Newslettersandemails
38%
However,only34%ofrespondentssaytheyperformsimulatedphishingattacks,despitethehighvolumeofmaliciousemailseeninthethreatlandscape.Thissuggeststhatthereisstillroomforimprovementinthecompositionofmostsecurityawarenesstrainingsyllabuses.
83
ofsurveyedsecurity
professionalsimplementmoretrainingtodrivebehaviorchange
81
implementmorecontrols
orrestrictions
Areasforimprovement
Securityisnotonlyatechnicalissue,butalsoaculturalandorganizationalone.Itrequiresthecollaborationandcommitmentofallstakeholders,fromsecurityprofessionalstoendusers.However,thereisoftenagapbetweenwhatsecurityprofessionalsthinkiseffectiveandwhatenduserssaywouldmotivatethemtoprioritizesecurity
Accordingtooursurvey,securityprofessionalsbelievethatmoretraining,tightercontrols,closerbusinessalignment,betterrewardsandstrongerchampioningofsecurityinitiativeswouldallbeeffectiveinimprovingsecurity.
However,fewerthanathirdoforganizationsrewardpositiveuserbehaviorsorchampionsecurityinitiatives.Theseareimportantwaystorecognizeandreinforcegoodsecuritypractices,andtoensurethatallemployeesareinvestedincreatingasecurity-awareculture.
Rank
ActionsTakenbySecurityPros
UserMotivation
1
Providemoretraining
Makingsecurityeasierforme
2
Implementmoresecuritycontrolsorrestrictions
Usingrewardsandrecognition
3
Alignsecurityinitiativeswithbusinesspriorities
Increasedengagementwithleadershipandsecurityteams
Incontrast,usersoverwhelminglysaythattheywantsecuritytobemadeeasier.Theywantprocessestobemoreuser-friendly,convenientandtransparent,andtheywanttohavemorecommunicationandfeedbackfromsecurityexperts.Usersoverwhelminglyagree(94%)thatimprovingeaseofusewouldmotivatethemtobemoreattentivetosecurity.Thesedisparitiesbetweensecurityteamactionsandusermotivationsclearlydemonstratetheneedforopencommunicationbetweensecurityteamsandendusers.
Makingsecurityeasierforme
Usingrewardsorrecognition
Increasedengagementfromleadershiporsecurityteam
Moretrainingordifferent
stylesoftraining
Punishment,suchasreductioninpay,bonusremoval,jobtermination
WhatPoliciesMotivateUserstoPrioritizeCybersecurity
94%
6%
89%
11%
87%
13%
85%
15%
71%
29%
Motivating NotMotivating
Inkeepingwithtrendswe’veobservedoverthepastfewyears,punishingunwantedbehaviorwasconsideredtheleasteffectiveapproachbysecurityprofessionals.Fortunately,itwasalsotheleastimplemented.Punishmentcanhavenegativeeffects,suchascreatingfear,resentmentanddistrust,andreducingmotivationandmorale.Itcanalsodiscourageusersfromreportingincidentsorseekinghelp,whichcanseriouslyincreasetheriskofsecuritybreaches.Punishmentwasalsotheleastmotivatingresponseamongendusers,though71%stillagreedthatthiswouldbeanincentiveforthem.Thissuggeststhatsomeusersmaybewillingtocomplywithsecurityrulestoavoidnegativeconsequences,thoughitisunlikelythatcompelledparticipationwillleadtoenduringbehaviorchange.
2024STATEOFTHEPHISH\REPORT
TheThreatLandscape
Cybersecurityisaconstantlyevolvingfieldascybercriminalsdevisenewandsophisticatedwaystoattackpeopleandbreachorganizations.Userswhotakerisks,suchasclickingonsuspiciouslinks,openingunknownattachmentsorusingweakpasswords,faceanincreasingvarietyofreal-worldthreatsfromattackers.
Threatprevalence
Someofthemostcommonformsofattackreportedbysurveyparticipantswerephishing,businessemailcompromise(BEC)andransomware.Whileeachofthesetechniquesisdistinct,securityteamswilloftenencounterthemasindividualcomponentsofanextendedattackchain,withphishingleadingtoransomware,orasupplychainattackleadingtoBEC.
PrevalenceofAttacks
76%
BulkPhishing USBDrop
SpearPhishing
BEC
Ransomware
74%
74%
73%
75%
85%
SociaMedia
SupplyChainRisk
DataLossviaExternalAttacker
%
60%
65
72%
74%
69%
69%
Smishing
67%
71%
Vishing
77%
76%
75%
76%
DataLossviaInsider
TOAD(CallbackPhishing)
66%
68%
64%
66%
67%
2023 2022
However,thesearen’ttheonlythreatsthatusersandorganizationsneedtobeawareof.Accordingtoourowndata,manynovelattacktypesarebecomingincreasinglyprominent.
14
2024STATEOFTHEPHISH\REPORT
Growingthreats:
TOAD,MFA-Bypass,QRcodesandgenerativeAI
Intelephone-orientedattackdelivery(TOAD),themaliciousmessageoftenappearstobecompletelybenign,containingnothingmorethanaphonenumberandsomeerroneousinformation.Itisn’tuntiltheunsuspectingvictimcallsthelistednumberforhelpthattheattackchainisactivated.Cybercriminalcallcentersareoperatingaroundtheworld,guidingvictimsintograntingremoteaccess,revealingsensitiveinformationandcredentials,oreveninfectingthemselveswithmalware.Ourdatarevealsthatanaverageof10millionTOADmessagesaresenteverymonth.
13million
Proofpointsawover13M
TOADattacksatpeakinAugust2023
89
Anotherincreasinglypopularattackmethodinvolvesusingadvancedtechniquestobypassmultifactorauthentication(MFA),whichisnowastandardpartofcorporatecybersecurity.TheseattackstypicallyuseproxyserverstointerceptMFAtokens,allowingattackerstocircumventtheadditionallayerofsecurityprovidedbyone-timecodesandbiometrics.Severaloff-the-shelfphishkitsnowincludeMFAbypassfunctionality,allowingevenrelativelyunsophisticatedattackerstobenefit.Weseearound1millionphishingthreatsusingthepopularEvilProxyframeworkeverymonth.Thisisofparticularconcern,as89%ofsecurityprofessionalsstillconsiderMFAtobeasilverbulletforprotectionagainstaccounttakeover,with84%ofrespondentssayingtheirorganizationsuseMFAtopreventaccounttakeover.
DoesMFAProvideCompleteProtectionAgainstAccountTakeover?
Completelyagree
ofsecurityprosbelievethatMFA 9
canprotectagainstaccount 1
compromisecompletely 2
42
47
Somewhatagree
NeitheragreeordisagreeSomewhatdisagreeCompletelydisagree
Andwithintheparadigmoftraditionalphishing,attackersarefindingnewwaystoembedmaliciouscontent.Inrecentmonthswe’veseenanincreaseintheuseofQRcodesasanalternativetolinksorattachments.Thistechniqueisparticularlydangerous,asitbothattemptstoevadeautomateddetectionwhilepresentinguserswithafamiliarformatinacontexttheymaynothaveseenbefore.ItisalsoimpossibletotelljustbylookingifaQRcodeleadstoaphishingsiteormalwaredownload.UnfamiliarusersscanningaQRcodemaynotevenbeawarethatthey’veengagedwithapieceofmaliciouscontentuntilit’stoolate.
15
It’salsoworthnotingthateventheleastcommontypeofattack—USBdrop—wasstillreportedby60%ofrespondents.Thisshowsthatcybercriminalsarewillingtotryanytactic,oldornew,iftheythinkitwillgivethemachancetoexploitanunsuspectingvictim.
Despitethegrowingprominenceandsophisticationofthesethreats,manyorganizationsarenotadequatelypreparedortrainedtodealwiththem.Only23%oforganizationstraintheirusersonhowtorecognizeandpreventTOADattacks,andonly23%educatetheirusersongenerativeAIsafety.
GenerativeAIisatechnologythatcancreaterealisticandconvincingcontent—suchasimages,videosortext—basedonagivenpromptordatainput.Thistechnologypromisestoenhancesocialengineeringforallmessaging-basedattacks,asattackerscanuseittoimprovethequalityoftheirlure,particularlywhentargetingotherlanguages.Moreover,generativeAIalsoposesariskofdataloss,asthereiscurrentlylittletransparencyoverwhathappenstodatathatisuploadedtoservicessuchasChatGPTandGoogleBard.
BECattacksbenefitfromAI
BECattacksalsocontinuetoposeaseriousthreat,especiallyinnon-English-speakingcountries.FewerorganizationsreportedBECattemptsglobally,butattackscontinuetogrowinprevalenceamongcountriessuchasJapan(35%year-over-yearincrease),Korea(31%jump),andUAE(29%jump).These
countriesmayhavepreviouslyseenfewerBECattacksduetolanguagebarriers,culturaldifferencesorlackofvisibility.ButthereisnowalikelylinkbetweenBECandgenerativeAI,asattackerscanusethelattertocreatemoreconvincingandpersonalizedemailsinmultiplelanguages.Ourowndatashowsanaverageof66milliontargetedBECattackseverymonth.
68million
maliciousmessagesincluded
referencestoMicrosoftand/orMicrosoftproductsin2023,makingthesoftwaregianttheworld’smostabusedbrand
Microsoftremainsmost-abusedbrand
Brandabuseisafavoritetacticforphishingandmalwaredelivery,asattackersexploitthetrustandfamiliaritythatusershavewithcertainbrands.Morethan68millionmessageswereassociatedwithMicrosoftproductsandbrandin2023,makingitthemostabusedbrandbycybercriminals.AdobeandDHLroundedoutthetopthree,butatfewerthan10millionmessageseach.
68
9.4
8.8
6.1
BrandAbuseThreats(Millions)
20million
Office365wasthemostabused
Microsoftproductinmaliciousemail,withover20millionemailthreatsusingthebrand
4.4
3.5
3.1
Microsof
t
Adobe
DHL
AOL
DocuSign
Amazon
Ransomwarestillamajorconcern
Thepercentageoforganizationsthatfacedaransomwareattackrose5percentagepointsto69%.Almost60%oforganizationsreportedfourormoreseparateransomwareincidentsinayear,indicatingthatransomwareisstillapersistentandlucrativeformofattack.
RansomwarebytheNumbers
39
3 38
5
15
1–3separateincidents
4–6separateincidents
7–9separateincidents
10ormoreseparateincidentsUnsure
Oneofthewaysthatorganizationstrytomitigatetheriskandimpactofcyberattacksisbypurchasingcyberinsurance,whichcoversthecostsanddamagesassociatedwithacybersecurityincident.Amongthosethathadexperiencedaransomwareincident,96%nowhavecyberinsurance.Mostinsurers(91%)helpedwithransompayments,upfrom82%theyearbefore.However,globally,therateofpaymenttoransomwareattackershasdeclinedfrom64%to54%.
InfectedOrganizationsThatAgreedtoPayRansom
54%
58%
64%
2023 2022 2021
Thenumberofrespondentswhoregainedaccesstotheirdataafterpayingalsodeclined,withthenumberwhoregainedaccessafterasinglepaymentseeingthelargestdecline.Thismaybeoneexplanationforthedropinpayments.Anotherpossiblereasonisthatorganizationsarebecomingmoreawareofthedrawbacksandrisksofpayingransoms,suchasencouragingmoreattacks,fundingcriminalactivitiesorreceivingcorruptedorincompletedata.
15
oforganizationsrefusedtopay
morethanoneransomaftertheirfirstpaymentdidn’tgettheirdataback,upfromjust6%in2022
RansomwareInfections:WhatHappensAfterPayment
41%
Regainedaccesstodataafterfirstpayment
41%
Paidadditionalransomdemand(s)andeventually
Refusedtopayaddtionalransomdemand(s)andwalked
6%
15%
43%
52%
Nevergotaccesstodataevenafterpayingransoms
1%
1% 2023
2022
Attackconsequences
Theimpactofphishingattacksonorganizationscanbedevastating,bothfinanciallyandreputationally.71%oforganizationsexperiencedatleastonesuccessfulphishingattackin2023,downfrom84%in2022.However,whiletheincidenceofsuccessfulphishingattackshasdeclined,someofthenegativeconsequenceshavesoared.Yearonyear,wesawa144%increaseinreportsoffinancialpenalties,suchasregulatoryfines,anda50%increaseinreportsofreputationaldamageduetophishingincidents.
73
oforganizationsreported
aBECattack,butonly
29
teachusersabout
BECattacks
ResultsofSuccessfulPhishingAttacks
Lossofdata/intellectualproperty
32%
33%
32%
Ransomwareinfection*
43%
29%
Breachofcustomer/clientdata
44%
27%
Credential/accountcompromise
Advancedpersistentthreat
23%
21%
22%
Directfinancialloss**
30%
Financialpenalty***
9%
22%
22%
Othermalwareinfection(s)
Reputationaldamage
18%
27%
36%
Zero-dayexploit
20%
20%
28%
Widespreadnetworkoutage/downtime
25%
26%
I’mnotsure
0%
2%
*malwarewasdeliveredviaemail
**wiretransferorinvoicefraud
***regulatoryfine
2023
2022
Thethreatlandscapeisconstantlyevolving,ascybercriminalsemploynewtacticsandtechniquesintheirquesttogainanadvantage.Thisiswhyit’skeytoequippeoplewiththeknowledgetheyneedtoidentifyandresistattacks;afterall,assophisticatedasthesetechniquesarebecoming,peopleremaintheirprimarytarget.Mostorganizationssaytheyusereal-worldthreatintelligencetoshapetheirsecurityawarenessprogram,howeverthereare
somemajordisparities.Forexample,73%oforganizationsexperiencedaBECattack,butonly29%trainusersspecificallyonBECthreats.Similarly,only23%oforganizationsprovidetrainingonTOADattacks,despitetheirubiquity.Thethreatlandscapemovesprettyfast;ifyoudon’tstopandupdateyourprogramonceinawhileyoucouldmisssomething.
2024STATEOFTHEPHISH\REPORT
OrganizationalBenchmarks
Oneofthewaysthatorganizationscanmeasureandimprovetheircybersecurityawarenessandresilienceisbyconductingphishingsimulations.Proofpointphishingsimulationsmimicreal-worldphishingscenariosandassesshowusersrespondtothem.Ourcustomersconducted183millionphishingsimulationsovera12-monthperiod.Ofthese,link-basedtestswerethemostcommon,accountingfor59%ofallsimulations,followedbydata-entrytests(30%)andattachment-basedtests(10%).However,attachment-basedtestshadthehighestfailurerateoverall,at17%.Failureratesforalltypesofsimulationswerewithin1percentagepointoflastyear’sresults.
SimulationTypeandFailureRate
66%
59%
2023frequenc
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025中国联通春季校园招聘(新苗)高频重点提升(共500题)附带答案详解
- 2025中国移动湖南分公司校园招聘高频重点提升(共500题)附带答案详解
- 2025中国电信河北秦皇岛分公司校园招聘11人高频重点提升(共500题)附带答案详解
- 2025下半年重庆沙坪坝区事业单位招聘93人历年高频重点提升(共500题)附带答案详解
- 2025下半年福建省宁德福安市事业单位招聘144人历年高频重点提升(共500题)附带答案详解
- 2025下半年四川省遂宁河东新区教师招聘79人历年高频重点提升(共500题)附带答案详解
- 2025下半年云南西双版纳州事业单位招聘工作人员255人高频重点提升(共500题)附带答案详解
- 2025上海市松江区部分事业单位招聘71人历年高频重点提升(共500题)附带答案详解
- 2025上半年江苏省南通启东事业单位招聘124人历年高频重点提升(共500题)附带答案详解
- 2025年度蛋糕店与健身中心合作经营合同2篇
- 国家开放大学《统计与数据分析基础》形考任务1-5答案
- 附件2:慢病管理中心评审实施细则2024年修订版
- 核反应堆热工分析课程设计
- (正式版)SH∕T 3548-2024 石油化工涂料防腐蚀工程施工及验收规范
- 2024年中国雄安集团招聘笔试参考题库含答案解析
- 道路、桥梁、隧道、地铁施工标准化手册(专业篇)
- 住宅小区室外道路及管网配套工程施工方案
- 风电分部工程验收签证表地基与基础008
- 申克转子秤安装图片指引ppt课件
- 山东昌乐二中“271高效课堂”教学模式
- 化工原理课程设计甲醇和水
评论
0/150
提交评论