版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
REPORT
2024StateofthePhish
Riskyactions,real-worldthreatsanduserresilienceinanageofhuman-centriccybersecurity
2024STATEOFTHEPHISH\REPORT
INTRODUCTION
Imagineasuccessfulcyberattackagainstyourorganization.Whatdoesitlooklike?Maybeitinvolvesafiendishlycleverpieceofsocialengineering—aconvincinglurethatcatchestherecipientoffguard.Ormaybeitwouldtakeasmarttechnicalexploittogetpastyourdefenses.Butinreality,threatactorsdon’talwayshavetotrythathard.
Often,theeasiestwaytobreachsecurityistoexploitthehumanfactor.Peopleareakeypartofanygooddefense,buttheycanalsobethemostvulnerable.Theymaymakemistakes,fallforscamsorsimplyignoresecuritybestpractices.Accordingtothisyear’sStateofthePhishsurvey,71%ofworkingadultsadmittedtotakingariskyaction,suchasreusingorsharingapassword,clickingonlinksfromunknownsenders,orgivingcredentialstoanuntrustworthysource.And96%ofthemdidsoknowingthattheyweretakingarisk.
Whenobligedtochoosebetweenconvenienceandsecurity,userspicktheformeralmosteverytime.So,whatcanorganizationsdotochangethis?Inthisreportwe’lltakeacloserlookathowattitudestowardssecuritymanifestinreal-worldbehavior,andhowthreatactorsarefindingnewwaystotakeadvantageofourpreferenceforspeedandexpedience.We’llalsoexaminethecurrentstateofsecurityawarenessinitiatives,aswellasbenchmarkingtheresilienceofpeopleandorganizationsagainstattack.
Thefoundationofthisreportisasurveyof7,500endusersand1,050securityprofessionals,conductedacross15countries.ItalsoincludesProofpointdataderivedfromourproductsandthreatresearch,aswellasfindingsfrom183millionsimulatedphishingmessagessentbyourcustomersovera12-monthperiodandmorethan24millionemailsreportedbyourcustomers’endusersoverthesameperiod.
2
2024STATEOFTHEPHISH\REPORT
TABLEOFCONTENTS
4KeyFindings
6SecurityBehaviorsandAttitudes
6 End-userbehaviorandattitudes
10SecurityAwarenessTrends
10 Currentstateofsecurityawareness
12 Areasforimprovement
14TheThreatLandscape
Threatprevalence
Growingthreats:TOAD,MFA-Bypass,QRcodesandgenerativeAI
BECattacksbenefitfromAI
Microsoftremainsmost-abusedbrand
Ransomwarestillamajorconcern
Attackconsequences
20OrganizationalBenchmarks
21 Industryfailurerate
27Conclusion
3
2024STATEOFTHEPHISH\REPORT
KEYFINDINGS
Over1million
attacksarelaunchedwithMFA-bypassframeworkEvilProxyeverymonth,but89%ofsecurityprofessionalsstillbelieveMFAprovidescompleteprotectionagainstaccounttakeover.
71 and 96
ofuserstooka
riskyaction
ofthemknewtheywere
doingsomethingrisky
66million
BECattacksweredetectedandblockedonaveragepermonthbyProofpoint.
oforganizationswereinfectedbyransomware.
69
4
2024STATEOFTHEPHISH\REPORT
85
ofsecurityprofessionalssaidthatmostemployeesknowtheyareresponsibleforsecurity,but
10million
59
Microsoftcontinuestobethe
mostabusedbrand,with
68million
ofuserseitherweren’tsureorclaimedthatthey’renotresponsibleatall.
TOADmessagesaresenteverymonth.
maliciousmessagesassociatedwiththebrandoritsproducts.
58
ofuserswhotookriskyactionsengagedinbehaviorthatwouldhavemadethemvulnerabletocommonsocialengineeringtactics.
5
SecurityBehaviorsandAttitudes
Eventhebesttechnicaldefensescanbeunderminedifusersdon’tdothebasics,suchasavoidingsuspiciouslinks,verifyingthesender’sidentityandsettingastrongpasswordandkeepingittothemselves.However,manyusersfailtofollowthesesimplerules,puttingthemselvesandtheirorganizationsatrisk.
End-userbehaviorandattitudes
Accordingtooursurvey,71%ofuserssaidtheytookariskyactionandalmostallofthem—96%—didsoknowingly.Amongthatgroup,73%saidthey’dtakentwoormoreriskyactions.Andmorethanathirdoftheriskstheytookwereratedbythoseusersaseither“extremelyrisky”or“veryrisky.”
RiskyActionsTaken
29%
26%
26%
24%
20%
19%
16%
13%
11%
10%
9%
29%
Useworkdeviceforpersonalactivities
Reuseorsharepassword
ConnectwithoutusingVPNatapublicplace
Respondtoamessage(emailorSMStext)fromsomeoneIdon’tknow
Accessinappropriatewebsite
ClickonlinksordownloadattachmentsfromsomeoneIdon’tknow
Shareworkdevicewithfriendsorfamily
Callanunfamiliarphonenumberinanurgentemail
Tailgating:allowotherstoentertheofficewithoutbadgingin
Uploadsensitivedatatounproventhird-partycloud
Givecredentialstountrustworthysource
Havenevertakenariskyaction
30% 25% 20% 15% 10% 5% 0%
Userstookriskyactionsforavarietyofreasons:convenience,timesavingandurgencybeingthemostcommonanswers.Butasmallcohortof2.5%tookriskyactionspurelyoutofcuriosity.Eitherway,themessageisclear:peoplearen’ttakingriskyactionsbecausetheylacksecurityawareness.Often,usersknowwhattheyaredoingwhentheytakerisksandarequitewillingtogamblewithorganizationalsecurity.
WhyRiskyActionisTaken
44%
Itisconvenient
24%
Tomeetanurgentdeadline
11%
Toachievearevenuetarget
5%
Other,pleasespecify
Tosavetime
19%
39%
Tosavemoney
10%
Tomeetotherperformanceobjectives
Nobodyknowsthisbetterthantheworld’scybercriminals.Theyunderstandthatpeoplecanbeexploited,eitherthroughnegligence,obliviousnessor—inrareinstances—malice.Socialengineeringisapartofalmosteveryemailthreatanalyzedbyourresearchers.And58%ofuserswhotookariskyactionsaid
theyengagedinbehaviorthatwouldputthematriskofbasicsocialengineeringtactics,suchasclickingonunknownlinks,respondingtounfamiliarsendersandsharingcredentialswithuntrustworthysources.Theseactionscanleadtoransomwareinfection,malware,databreachorfinancialloss.
Oneofthereasonsuserstaketheserisksisalackofconsensusaboutaccountabilityandresponsibility.Only41%ofuserssaidtheyknowthattheybearresponsibilityforcybersecurityattheirworkplace.About7%claimedthattheyaren’tresponsibleatall,whilethemajority(52%)weren’tsure.
PerceptiononSecurityResponsibility
41vs.85
7vs.13
52vs.2
Yes–Employeesthinktheyareresponsibleforsecurity
No–Employeesbelievesecurityisnottheirresponsibility
Notsure
Employees
SecurityProfessionals
63
ofsecurityprofessionals
rateduserswithaccesstocriticalbusinessdataasthetopcybersecurityrisk
Thiscontrastswiththeviewamongsecurityprofessionals,85%ofwhomsaythatmostemployeesknowtheyareresponsibleforsecurity.Thisgapbetweenperceptionandrealitysuggeststhatthereisaneedforclearercommunicationaboutsharedresponsibility,ratherthanjustmoretrainingonsecuritybestpracticesandpolicies.
Theprofessionalview
Securityprofessionalsunderstandablyhaveadifferentperspectiveonsecurityriskstoendusers.Theyaremoreawareofthethreatlandscapeandtheconsequencesofabreach.Andtheyhave
amorenuancedunderstandingofthechallengesthatgointosecuringcomplexanddynamicenvironments.Theyalsohavetheunenviabletaskoffindingwaystobalancetheneedforsecuritywiththeneedforunhinderedproductivityandefficiency.
Accordingtooursurveyofsecurityprofessionals,theyrateuserswithaccesstobusiness-criticaldataasthebiggestsecurityrisk(63%)—agroupthatisinevitablyhardtomanage,asmuchofthataccessisnecessary.Butclick-happy
usersandthosewhodon’tcompletesecurityawarenesstrainingareclosebehindinjointsecondplace(56%each).Thesecategoriesofuserwereallconsideredsignificantlymoreriskythanexecutives/VIPs(34%),despitethelattergroupoftenhavingbroadaccesstovaluabledata.
UsersWhoRepresentRisk
Userswhohavebusinessprivilegeandaccesstocriticaldata
Userswhoareclickhappy
Userswhoconsistentlyfailtocompletetrainingassignment
Suppliersorbusinesspartners
Peoplewhoareleaving
42%
VIPs,executives
34%
49%
56%
56%
63%
Unfortunately,oursurveyrevealssignificantoverlapbetweentheriskiestbehaviorsidentifiedbysecurityprofessionalsandthemostcommonriskyactionstakenbyendusers.Reusingpasswords,usingworkdevicesforpersonalactivitiesandaccessinginappropriatewebsitesareamongbehaviorsconsideredthemostunsafe;allofthemappearedinthetopactionstakenbyusers.
Rank
TopRisksConsideredbyInfosec
TopRiskyActionsTakenbyUsers
1
ClickonlinksordownloadattachmentsfromsomeoneIdon’tknow
Useworkdeviceforpersonalactivities
2
Reuseorsharepassword
Reuseorsharepassword
3
Accessinappropriatewebsite
ConnectwithoutusingVPNatapublicplace
4
Uploadsensitivedatatounproventhird-partycloud
Respondtoamessage(emailorSMStext)fromsomeoneIdon’tknow
5
Useworkdeviceforpersonalactivities
Accessinappropriatewebsite
Thisoverlapsuggeststhatusersmaybetakingsomeoftheseactionsbecausetheyareunawareofjusthowriskytheyareconsideredbysecurityteams.
SecurityAwarenessTrends
Whiletrainingaloneisn’tenoughtochangeunsafebehavior,teamsthatlackbasicsecurityawarenesstoolsandknowledgearestillmuchmorelikelytofallpreytocybercriminals.But
asnewsocialengineeringluresandtechniquesappearonthethreatlandscape,awarenessprogramsmustbeagileandbroad-basedtoremainrelevant.
Currentstateofsecurityawareness
Firstsomepositivenews:99%ofrespondentssaidtheyhaveasecurityawarenessprogramofsomesortupandrunning.Butwhilethebasicsmayalreadybeinplace,manyarestrugglingtodriverealbehavioralchange.Apossiblereasonforthisisthatonly53%saytheytraineveryoneintheorganization(downfrom56%lastyear).Thismeansthatsomeusersmaybeleftoutoftheloopormayreceiveinadequateoroutdatedtraining.
SecurityAwarenessActivitiesAssignment
Everyoneintheorganization
28%
Onlyspecificdepartmentsandroles
6%
Onlyspecificindividuals
Notsure 1%
1%
15%
41%
2023
53%
2022
56%
Anotherchallengeisthecoverageandrelevanceoftrainingtopics.Securityprofessionalsagreethatremotework,passwordhygieneandinternetsafetyarecritical,butlessthanathirdofsecurityawarenessprogramscoverallthese
topics.Thetoptrainingtopicscitedbyrespondentsweremalware,Wi-Fisecurity,ransomwareandemailphishing,whichareallimportant,butnotsufficient
toaddressthefullspectrumofrisks.Andaswe’llseelaterwhenweexaminethelatestcybercriminaltacticsandtechniques,emergingthreatscanquicklybecomecommonplace,takingunpreparedusersbysurprise.
41 from28
Thepercentageoforganizations
thattrainedspecificrolesjumpedyearoveryear
Onthepositiveside,thesurveyshowssomesignsofimprovementandinnovationinsecurityawarenesstactics.Yearoveryear,trainingofspecificrolesanddepartmentshasrisensignificantly(41%from28%),indicatingamoretailoredandtargetedapproach.Timeallocatedtousereducationhasalsoincreasedyearoveryear,withmorerespondentsdedicatingoverthreehoursperyeartoawarenesstraining.Overall,theaverageamountoftimededicatedtoawarenesstraininghasincreasedforthefirsttimeinthreeyears.
TimeAllocatedforSecurityAwarenessActivities
6 25
17 37
15
30minutesorless31–59minutes
1–2hours
3–4hours
Morethan4hours
Cybersecurity-basedcontestsandprizes
33%
Smishingandvishingsimulations
33%
SimulatedUSBdrops
23%
Internalcybersecuritychatchannel
30%
Internalwiki
23%
Mycompanydoesnothaveasecurityawarenessprogram
1%
Thetypesoftacticsbeingusedareevolving,too,witha23%increaseintheuseofcontestsandprizestogamifyandincentivizeattention.Thischangecanhelpincreaseuserengagementandmotivation,whilealsocreatingapositiveandfunlearningenvironment.Computer-basedtrainingremainsthemostcommonformat(45%),butothermethodssuchassimulatedUSBdrops,videos,postersandnewslettersarealsobeingused.
In-persontrainingsessions
37%
Virtual,instructor-ledtraining
34%
Computer-basedtraining
45%
Simulatedphishingattacks
34%
Awarenesspostersandvideos
31%
Newslettersandemails
38%
However,only34%ofrespondentssaytheyperformsimulatedphishingattacks,despitethehighvolumeofmaliciousemailseeninthethreatlandscape.Thissuggeststhatthereisstillroomforimprovementinthecompositionofmostsecurityawarenesstrainingsyllabuses.
83
ofsurveyedsecurity
professionalsimplementmoretrainingtodrivebehaviorchange
81
implementmorecontrols
orrestrictions
Areasforimprovement
Securityisnotonlyatechnicalissue,butalsoaculturalandorganizationalone.Itrequiresthecollaborationandcommitmentofallstakeholders,fromsecurityprofessionalstoendusers.However,thereisoftenagapbetweenwhatsecurityprofessionalsthinkiseffectiveandwhatenduserssaywouldmotivatethemtoprioritizesecurity
Accordingtooursurvey,securityprofessionalsbelievethatmoretraining,tightercontrols,closerbusinessalignment,betterrewardsandstrongerchampioningofsecurityinitiativeswouldallbeeffectiveinimprovingsecurity.
However,fewerthanathirdoforganizationsrewardpositiveuserbehaviorsorchampionsecurityinitiatives.Theseareimportantwaystorecognizeandreinforcegoodsecuritypractices,andtoensurethatallemployeesareinvestedincreatingasecurity-awareculture.
Rank
ActionsTakenbySecurityPros
UserMotivation
1
Providemoretraining
Makingsecurityeasierforme
2
Implementmoresecuritycontrolsorrestrictions
Usingrewardsandrecognition
3
Alignsecurityinitiativeswithbusinesspriorities
Increasedengagementwithleadershipandsecurityteams
Incontrast,usersoverwhelminglysaythattheywantsecuritytobemadeeasier.Theywantprocessestobemoreuser-friendly,convenientandtransparent,andtheywanttohavemorecommunicationandfeedbackfromsecurityexperts.Usersoverwhelminglyagree(94%)thatimprovingeaseofusewouldmotivatethemtobemoreattentivetosecurity.Thesedisparitiesbetweensecurityteamactionsandusermotivationsclearlydemonstratetheneedforopencommunicationbetweensecurityteamsandendusers.
Makingsecurityeasierforme
Usingrewardsorrecognition
Increasedengagementfromleadershiporsecurityteam
Moretrainingordifferent
stylesoftraining
Punishment,suchasreductioninpay,bonusremoval,jobtermination
WhatPoliciesMotivateUserstoPrioritizeCybersecurity
94%
6%
89%
11%
87%
13%
85%
15%
71%
29%
Motivating NotMotivating
Inkeepingwithtrendswe’veobservedoverthepastfewyears,punishingunwantedbehaviorwasconsideredtheleasteffectiveapproachbysecurityprofessionals.Fortunately,itwasalsotheleastimplemented.Punishmentcanhavenegativeeffects,suchascreatingfear,resentmentanddistrust,andreducingmotivationandmorale.Itcanalsodiscourageusersfromreportingincidentsorseekinghelp,whichcanseriouslyincreasetheriskofsecuritybreaches.Punishmentwasalsotheleastmotivatingresponseamongendusers,though71%stillagreedthatthiswouldbeanincentiveforthem.Thissuggeststhatsomeusersmaybewillingtocomplywithsecurityrulestoavoidnegativeconsequences,thoughitisunlikelythatcompelledparticipationwillleadtoenduringbehaviorchange.
2024STATEOFTHEPHISH\REPORT
TheThreatLandscape
Cybersecurityisaconstantlyevolvingfieldascybercriminalsdevisenewandsophisticatedwaystoattackpeopleandbreachorganizations.Userswhotakerisks,suchasclickingonsuspiciouslinks,openingunknownattachmentsorusingweakpasswords,faceanincreasingvarietyofreal-worldthreatsfromattackers.
Threatprevalence
Someofthemostcommonformsofattackreportedbysurveyparticipantswerephishing,businessemailcompromise(BEC)andransomware.Whileeachofthesetechniquesisdistinct,securityteamswilloftenencounterthemasindividualcomponentsofanextendedattackchain,withphishingleadingtoransomware,orasupplychainattackleadingtoBEC.
PrevalenceofAttacks
76%
BulkPhishing USBDrop
SpearPhishing
BEC
Ransomware
74%
74%
73%
75%
85%
SociaMedia
SupplyChainRisk
DataLossviaExternalAttacker
%
60%
65
72%
74%
69%
69%
Smishing
67%
71%
Vishing
77%
76%
75%
76%
DataLossviaInsider
TOAD(CallbackPhishing)
66%
68%
64%
66%
67%
2023 2022
However,thesearen’ttheonlythreatsthatusersandorganizationsneedtobeawareof.Accordingtoourowndata,manynovelattacktypesarebecomingincreasinglyprominent.
14
2024STATEOFTHEPHISH\REPORT
Growingthreats:
TOAD,MFA-Bypass,QRcodesandgenerativeAI
Intelephone-orientedattackdelivery(TOAD),themaliciousmessageoftenappearstobecompletelybenign,containingnothingmorethanaphonenumberandsomeerroneousinformation.Itisn’tuntiltheunsuspectingvictimcallsthelistednumberforhelpthattheattackchainisactivated.Cybercriminalcallcentersareoperatingaroundtheworld,guidingvictimsintograntingremoteaccess,revealingsensitiveinformationandcredentials,oreveninfectingthemselveswithmalware.Ourdatarevealsthatanaverageof10millionTOADmessagesaresenteverymonth.
13million
Proofpointsawover13M
TOADattacksatpeakinAugust2023
89
Anotherincreasinglypopularattackmethodinvolvesusingadvancedtechniquestobypassmultifactorauthentication(MFA),whichisnowastandardpartofcorporatecybersecurity.TheseattackstypicallyuseproxyserverstointerceptMFAtokens,allowingattackerstocircumventtheadditionallayerofsecurityprovidedbyone-timecodesandbiometrics.Severaloff-the-shelfphishkitsnowincludeMFAbypassfunctionality,allowingevenrelativelyunsophisticatedattackerstobenefit.Weseearound1millionphishingthreatsusingthepopularEvilProxyframeworkeverymonth.Thisisofparticularconcern,as89%ofsecurityprofessionalsstillconsiderMFAtobeasilverbulletforprotectionagainstaccounttakeover,with84%ofrespondentssayingtheirorganizationsuseMFAtopreventaccounttakeover.
DoesMFAProvideCompleteProtectionAgainstAccountTakeover?
Completelyagree
ofsecurityprosbelievethatMFA 9
canprotectagainstaccount 1
compromisecompletely 2
42
47
Somewhatagree
NeitheragreeordisagreeSomewhatdisagreeCompletelydisagree
Andwithintheparadigmoftraditionalphishing,attackersarefindingnewwaystoembedmaliciouscontent.Inrecentmonthswe’veseenanincreaseintheuseofQRcodesasanalternativetolinksorattachments.Thistechniqueisparticularlydangerous,asitbothattemptstoevadeautomateddetectionwhilepresentinguserswithafamiliarformatinacontexttheymaynothaveseenbefore.ItisalsoimpossibletotelljustbylookingifaQRcodeleadstoaphishingsiteormalwaredownload.UnfamiliarusersscanningaQRcodemaynotevenbeawarethatthey’veengagedwithapieceofmaliciouscontentuntilit’stoolate.
15
It’salsoworthnotingthateventheleastcommontypeofattack—USBdrop—wasstillreportedby60%ofrespondents.Thisshowsthatcybercriminalsarewillingtotryanytactic,oldornew,iftheythinkitwillgivethemachancetoexploitanunsuspectingvictim.
Despitethegrowingprominenceandsophisticationofthesethreats,manyorganizationsarenotadequatelypreparedortrainedtodealwiththem.Only23%oforganizationstraintheirusersonhowtorecognizeandpreventTOADattacks,andonly23%educatetheirusersongenerativeAIsafety.
GenerativeAIisatechnologythatcancreaterealisticandconvincingcontent—suchasimages,videosortext—basedonagivenpromptordatainput.Thistechnologypromisestoenhancesocialengineeringforallmessaging-basedattacks,asattackerscanuseittoimprovethequalityoftheirlure,particularlywhentargetingotherlanguages.Moreover,generativeAIalsoposesariskofdataloss,asthereiscurrentlylittletransparencyoverwhathappenstodatathatisuploadedtoservicessuchasChatGPTandGoogleBard.
BECattacksbenefitfromAI
BECattacksalsocontinuetoposeaseriousthreat,especiallyinnon-English-speakingcountries.FewerorganizationsreportedBECattemptsglobally,butattackscontinuetogrowinprevalenceamongcountriessuchasJapan(35%year-over-yearincrease),Korea(31%jump),andUAE(29%jump).These
countriesmayhavepreviouslyseenfewerBECattacksduetolanguagebarriers,culturaldifferencesorlackofvisibility.ButthereisnowalikelylinkbetweenBECandgenerativeAI,asattackerscanusethelattertocreatemoreconvincingandpersonalizedemailsinmultiplelanguages.Ourowndatashowsanaverageof66milliontargetedBECattackseverymonth.
68million
maliciousmessagesincluded
referencestoMicrosoftand/orMicrosoftproductsin2023,makingthesoftwaregianttheworld’smostabusedbrand
Microsoftremainsmost-abusedbrand
Brandabuseisafavoritetacticforphishingandmalwaredelivery,asattackersexploitthetrustandfamiliaritythatusershavewithcertainbrands.Morethan68millionmessageswereassociatedwithMicrosoftproductsandbrandin2023,makingitthemostabusedbrandbycybercriminals.AdobeandDHLroundedoutthetopthree,butatfewerthan10millionmessageseach.
68
9.4
8.8
6.1
BrandAbuseThreats(Millions)
20million
Office365wasthemostabused
Microsoftproductinmaliciousemail,withover20millionemailthreatsusingthebrand
4.4
3.5
3.1
Microsof
t
Adobe
DHL
AOL
DocuSign
Amazon
Ransomwarestillamajorconcern
Thepercentageoforganizationsthatfacedaransomwareattackrose5percentagepointsto69%.Almost60%oforganizationsreportedfourormoreseparateransomwareincidentsinayear,indicatingthatransomwareisstillapersistentandlucrativeformofattack.
RansomwarebytheNumbers
39
3 38
5
15
1–3separateincidents
4–6separateincidents
7–9separateincidents
10ormoreseparateincidentsUnsure
Oneofthewaysthatorganizationstrytomitigatetheriskandimpactofcyberattacksisbypurchasingcyberinsurance,whichcoversthecostsanddamagesassociatedwithacybersecurityincident.Amongthosethathadexperiencedaransomwareincident,96%nowhavecyberinsurance.Mostinsurers(91%)helpedwithransompayments,upfrom82%theyearbefore.However,globally,therateofpaymenttoransomwareattackershasdeclinedfrom64%to54%.
InfectedOrganizationsThatAgreedtoPayRansom
54%
58%
64%
2023 2022 2021
Thenumberofrespondentswhoregainedaccesstotheirdataafterpayingalsodeclined,withthenumberwhoregainedaccessafterasinglepaymentseeingthelargestdecline.Thismaybeoneexplanationforthedropinpayments.Anotherpossiblereasonisthatorganizationsarebecomingmoreawareofthedrawbacksandrisksofpayingransoms,suchasencouragingmoreattacks,fundingcriminalactivitiesorreceivingcorruptedorincompletedata.
15
oforganizationsrefusedtopay
morethanoneransomaftertheirfirstpaymentdidn’tgettheirdataback,upfromjust6%in2022
RansomwareInfections:WhatHappensAfterPayment
41%
Regainedaccesstodataafterfirstpayment
41%
Paidadditionalransomdemand(s)andeventually
Refusedtopayaddtionalransomdemand(s)andwalked
6%
15%
43%
52%
Nevergotaccesstodataevenafterpayingransoms
1%
1% 2023
2022
Attackconsequences
Theimpactofphishingattacksonorganizationscanbedevastating,bothfinanciallyandreputationally.71%oforganizationsexperiencedatleastonesuccessfulphishingattackin2023,downfrom84%in2022.However,whiletheincidenceofsuccessfulphishingattackshasdeclined,someofthenegativeconsequenceshavesoared.Yearonyear,wesawa144%increaseinreportsoffinancialpenalties,suchasregulatoryfines,anda50%increaseinreportsofreputationaldamageduetophishingincidents.
73
oforganizationsreported
aBECattack,butonly
29
teachusersabout
BECattacks
ResultsofSuccessfulPhishingAttacks
Lossofdata/intellectualproperty
32%
33%
32%
Ransomwareinfection*
43%
29%
Breachofcustomer/clientdata
44%
27%
Credential/accountcompromise
Advancedpersistentthreat
23%
21%
22%
Directfinancialloss**
30%
Financialpenalty***
9%
22%
22%
Othermalwareinfection(s)
Reputationaldamage
18%
27%
36%
Zero-dayexploit
20%
20%
28%
Widespreadnetworkoutage/downtime
25%
26%
I’mnotsure
0%
2%
*malwarewasdeliveredviaemail
**wiretransferorinvoicefraud
***regulatoryfine
2023
2022
Thethreatlandscapeisconstantlyevolving,ascybercriminalsemploynewtacticsandtechniquesintheirquesttogainanadvantage.Thisiswhyit’skeytoequippeoplewiththeknowledgetheyneedtoidentifyandresistattacks;afterall,assophisticatedasthesetechniquesarebecoming,peopleremaintheirprimarytarget.Mostorganizationssaytheyusereal-worldthreatintelligencetoshapetheirsecurityawarenessprogram,howeverthereare
somemajordisparities.Forexample,73%oforganizationsexperiencedaBECattack,butonly29%trainusersspecificallyonBECthreats.Similarly,only23%oforganizationsprovidetrainingonTOADattacks,despitetheirubiquity.Thethreatlandscapemovesprettyfast;ifyoudon’tstopandupdateyourprogramonceinawhileyoucouldmisssomething.
2024STATEOFTHEPHISH\REPORT
OrganizationalBenchmarks
Oneofthewaysthatorganizationscanmeasureandimprovetheircybersecurityawarenessandresilienceisbyconductingphishingsimulations.Proofpointphishingsimulationsmimicreal-worldphishingscenariosandassesshowusersrespondtothem.Ourcustomersconducted183millionphishingsimulationsovera12-monthperiod.Ofthese,link-basedtestswerethemostcommon,accountingfor59%ofallsimulations,followedbydata-entrytests(30%)andattachment-basedtests(10%).However,attachment-basedtestshadthehighestfailurerateoverall,at17%.Failureratesforalltypesofsimulationswerewithin1percentagepointoflastyear’sresults.
SimulationTypeandFailureRate
66%
59%
2023frequenc
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年環(huán)保廢棄物處理服務(wù)合同
- 2025年度航空航天研發(fā)設(shè)備采購合同解除書3篇
- 2025年度空運貨物出口運輸與國際航空運輸協(xié)會會員服務(wù)協(xié)議3篇
- 2024貿(mào)促會指定下載專區(qū)計算機硬件買賣合同3篇
- 一宅一物金銀銅專屬定制配送合同版
- 2024智能無人機研發(fā)與銷售服務(wù)合同
- 2024無房產(chǎn)離婚協(xié)議書制作指南與注意事項3篇
- 2025年度鏟車租賃與設(shè)備租賃組合服務(wù)合同2篇
- 手衛(wèi)生相關(guān)知識培訓(xùn)課件
- 2024微信小程序用戶體驗設(shè)計服務(wù)合同3篇
- 2024年大學(xué)試題(宗教學(xué))-佛教文化筆試考試歷年典型考題及考點含含答案
- 北航機械原理及設(shè)計課件
- 電腦耗材實施方案、供貨方案、售后服務(wù)方案
- 環(huán)衛(wèi)項目年終工作總結(jié)
- (高清版)DZT 0432-2023 煤炭與煤層氣礦產(chǎn)綜合勘查規(guī)范
- 郵政儲蓄銀行-客戶經(jīng)理(個人消費貸款)-試題+答案
- 中國專利獎申報要點
- 2024年大學(xué)試題(宗教學(xué))-佛教文化筆試歷年真題薈萃含答案
- 《中外美術(shù)鑒賞》課件西方美術(shù)鑒賞導(dǎo)論
- 中小學(xué)教師違反職業(yè)道德行為處理辦法
- 梁平法制圖規(guī)則及鋼筋翻樣講解
評論
0/150
提交評論