Phishing Remains the Main Attack Vector

Category: News
Published: 9th December 2024

< Back to Media
Phishing,Scam,From,Hackers,Stealing,User,Credit,Card,Online.,Via

Phishing has persisted as a top cyber threat for over a decade, remaining a widespread and costly attack vector. As we advance into 2025, the methods and technologies behind phishing are expected to evolve, increasing in sophistication to overcome current security measures.

An increasing concern is the commercialisation of phishing through ‘toolkits’ that attackers can purchase. These toolkits, often targeting identity information, have exacerbated phishing risks, with identity and credential compromises involved in 80% of phishing incidents.

A particular phishing technique known as adversary-in-the-middle (AitM) has gained traction, circumventing traditional defences like multifactor authentication (MFA) and Endpoint Detection & Response (EDR). AitM phishing toolkits, including Modlishka, Muraena, and Evilginx, create a reverse proxy between a target and a legitimate website. The attacker intercepts communications, collecting sensitive data while the user remains unaware. This approach bypasses user vigilance by creating seemingly authentic web pages, allowing attackers to capture login credentials and other critical information.

Cyber criminals are expanding their methods with emerging types of phishing, such as quishing, smishing, and vishing. Quishing leverages QR codes embedded with malware, which, when scanned, can compromise a target’s device. Smishing and vishing use SMS and phone calls, respectively, to deceive users into disclosing sensitive data. With personal devices increasingly holding sensitive information, the success rates of these new phishing vectors continue to grow. These variations retain phishing’s core objective, exploiting user trust to gather sensitive information. As these newer techniques gain prominence, user awareness must grow to mitigate their impact.

Sign up for your Free Phishing Test

Cyber Security in 2025: An Overview

Lined of code, with a white key over the top.
Find out more

Business Email Compromise (BEC)

Male figure checking off a virtual document.
Find out more

Cyber Security Decoded: Navigating Risk, Resources, and Resilience

Dark lock and pixels
Find out more