07/30/2025 | Press release | Distributed by Public on 07/30/2025 10:23
It seems everyone loves phishing attacks.
Trustwave's Ed Williams, vice president of SpiderLabs, during a recent Trustwave webinar, discussed the ongoing threat posed by the increasingly sophisticated phishing incidents that remain the primary vector for initial access in cyberattacks.
What Williams interestingly noted was that threat actors are not the only group using phishing to gain access to organizations. It's also the preferred method used by cybersecurity professionals conducting penetration tests and red and purple teaming exercises.
Why? Because, unfortunately, it works the majority of the time, which makes it a great weapon, but this very fact also makes it a great teaching tool.
Trustwave has introduced the Trustwave Managed Phishing for Microsoft, which is designed to educate employees on recognizing and responding to phishing emails. But more on this later.
The most recent FBI numbersshow phishing was the most reported cybercrime last year, with 193,407 complaints, alongside 21,442 cases of business email compromise (BEC). This data confirms what security experts have long advised: a layered email security strategy is no longer optional; it's a necessity.
The financial ramifications of successful phishing attacks are substantial, with an estimated $55 billionlost due to business email compromise (BEC)incidents, which are usually a direct spin-off from a phishing incident.
Successful initial compromise via phishing often enables attackers to achieve lateral movement within an organization, leading to further malicious activities, such as injecting ransomware into a system.
The success phishing enjoys has spurred attackers to adopt related styles of attacks, such as quishing, Williams noted. There has been a 500% increase in "quishing" attacks, which leverage QR codes, and it is an issue that Trustwave often comes across. The success of these attacks is largely attributed to the current limitations of security infrastructures in detecting and analyzing malicious QR codes, and sometimes general ignorance among the recipients that a QR code can even be dangerous.
Trustwave MailMarshal's engine was updatedlast year to identify QR codes within emails, ensuring our detection filters catch an associated malicious activity. AI powers these engines to identify and recognize patterns to detect quishing attacks and eliminate the threat before it hits a client's inbox.
The increasing sophistication of phishing campaigns is further amplified by the integration of Artificial Intelligence (AI). AI tools allow threat actors to craft highly convincing and complex phishing scenarios with greater ease and scale, posing a significant challenge for defensive measures.
During the webinar, Williams analyzed the current threat landscape, revealing several predominant phishing tactics:
The following attachment types, which are generally considered safe by a recipient, are frequently employed in phishing attacks, according to Trustwave research:
While some of these methods may seem outdated, their continued success highlights persistent vulnerabilities that organizations must address at their network perimeters. And these methods will continue to be used as long as they are successful.
Trustwave's Managed Phishing for Microsoftis a service designed specifically for organizations leveraging Microsoft Office 365 and Defender for Office (E5 or equivalent). While Microsoft email security'snative tools are a strong foundation, today's AI-enhanced phishing attacks demand greater protection, faster response, and more ongoing user awareness than most internal teams can support on their own.
The service's key components include:
Sign up to receive the latest security news and trends straight to your inbox from Trustwave.
Stay Informed:
Sign up to receive the latest security news and trends straight to your inbox from Trustwave.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.