2024年網(wǎng)絡(luò)釣魚(yú)報(bào)告_第1頁(yè)
2024年網(wǎng)絡(luò)釣魚(yú)報(bào)告_第2頁(yè)
2024年網(wǎng)絡(luò)釣魚(yú)報(bào)告_第3頁(yè)
2024年網(wǎng)絡(luò)釣魚(yú)報(bào)告_第4頁(yè)
2024年網(wǎng)絡(luò)釣魚(yú)報(bào)告_第5頁(yè)
已閱讀5頁(yè),還剩23頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

REPORT

2024StateofthePhish

Riskyactions,real-worldthreatsanduserresilienceinanageofhuman-centriccybersecurity

2024STATEOFTHEPHISH\REPORT

INTRODUCTION

Imagineasuccessfulcyberattackagainstyourorganization.Whatdoesitlooklike?Maybeitinvolvesafiendishlycleverpieceofsocialengineering—aconvincinglurethatcatchestherecipientoffguard.Ormaybeitwouldtakeasmarttechnicalexploittogetpastyourdefenses.Butinreality,threatactorsdon’talwayshavetotrythathard.

Often,theeasiestwaytobreachsecurityistoexploitthehumanfactor.Peopleareakeypartofanygooddefense,buttheycanalsobethemostvulnerable.Theymaymakemistakes,fallforscamsorsimplyignoresecuritybestpractices.Accordingtothisyear’sStateofthePhishsurvey,71%ofworkingadultsadmittedtotakingariskyaction,suchasreusingorsharingapassword,clickingonlinksfromunknownsenders,orgivingcredentialstoanuntrustworthysource.And96%ofthemdidsoknowingthattheyweretakingarisk.

Whenobligedtochoosebetweenconvenienceandsecurity,userspicktheformeralmosteverytime.So,whatcanorganizationsdotochangethis?Inthisreportwe’lltakeacloserlookathowattitudestowardssecuritymanifestinreal-worldbehavior,andhowthreatactorsarefindingnewwaystotakeadvantageofourpreferenceforspeedandexpedience.We’llalsoexaminethecurrentstateofsecurityawarenessinitiatives,aswellasbenchmarkingtheresilienceofpeopleandorganizationsagainstattack.

Thefoundationofthisreportisasurveyof7,500endusersand1,050securityprofessionals,conductedacross15countries.ItalsoincludesProofpointdataderivedfromourproductsandthreatresearch,aswellasfindingsfrom183millionsimulatedphishingmessagessentbyourcustomersovera12-monthperiodandmorethan24millionemailsreportedbyourcustomers’endusersoverthesameperiod.

2

2024STATEOFTHEPHISH\REPORT

TABLEOFCONTENTS

4KeyFindings

6SecurityBehaviorsandAttitudes

6 End-userbehaviorandattitudes

10SecurityAwarenessTrends

10 Currentstateofsecurityawareness

12 Areasforimprovement

14TheThreatLandscape

Threatprevalence

Growingthreats:TOAD,MFA-Bypass,QRcodesandgenerativeAI

BECattacksbenefitfromAI

Microsoftremainsmost-abusedbrand

Ransomwarestillamajorconcern

Attackconsequences

20OrganizationalBenchmarks

21 Industryfailurerate

27Conclusion

3

2024STATEOFTHEPHISH\REPORT

KEYFINDINGS

Over1million

attacksarelaunchedwithMFA-bypassframeworkEvilProxyeverymonth,but89%ofsecurityprofessionalsstillbelieveMFAprovidescompleteprotectionagainstaccounttakeover.

71 and 96

ofuserstooka

riskyaction

ofthemknewtheywere

doingsomethingrisky

66million

BECattacksweredetectedandblockedonaveragepermonthbyProofpoint.

oforganizationswereinfectedbyransomware.

69

4

2024STATEOFTHEPHISH\REPORT

85

ofsecurityprofessionalssaidthatmostemployeesknowtheyareresponsibleforsecurity,but

10million

59

Microsoftcontinuestobethe

mostabusedbrand,with

68million

ofuserseitherweren’tsureorclaimedthatthey’renotresponsibleatall.

TOADmessagesaresenteverymonth.

maliciousmessagesassociatedwiththebrandoritsproducts.

58

ofuserswhotookriskyactionsengagedinbehaviorthatwouldhavemadethemvulnerabletocommonsocialengineeringtactics.

5

SecurityBehaviorsandAttitudes

Eventhebesttechnicaldefensescanbeunderminedifusersdon’tdothebasics,suchasavoidingsuspiciouslinks,verifyingthesender’sidentityandsettingastrongpasswordandkeepingittothemselves.However,manyusersfailtofollowthesesimplerules,puttingthemselvesandtheirorganizationsatrisk.

End-userbehaviorandattitudes

Accordingtooursurvey,71%ofuserssaidtheytookariskyactionandalmostallofthem—96%—didsoknowingly.Amongthatgroup,73%saidthey’dtakentwoormoreriskyactions.Andmorethanathirdoftheriskstheytookwereratedbythoseusersaseither“extremelyrisky”or“veryrisky.”

RiskyActionsTaken

29%

26%

26%

24%

20%

19%

16%

13%

11%

10%

9%

29%

Useworkdeviceforpersonalactivities

Reuseorsharepassword

ConnectwithoutusingVPNatapublicplace

Respondtoamessage(emailorSMStext)fromsomeoneIdon’tknow

Accessinappropriatewebsite

ClickonlinksordownloadattachmentsfromsomeoneIdon’tknow

Shareworkdevicewithfriendsorfamily

Callanunfamiliarphonenumberinanurgentemail

Tailgating:allowotherstoentertheofficewithoutbadgingin

Uploadsensitivedatatounproventhird-partycloud

Givecredentialstountrustworthysource

Havenevertakenariskyaction

30% 25% 20% 15% 10% 5% 0%

Userstookriskyactionsforavarietyofreasons:convenience,timesavingandurgencybeingthemostcommonanswers.Butasmallcohortof2.5%tookriskyactionspurelyoutofcuriosity.Eitherway,themessageisclear:peoplearen’ttakingriskyactionsbecausetheylacksecurityawareness.Often,usersknowwhattheyaredoingwhentheytakerisksandarequitewillingtogamblewithorganizationalsecurity.

WhyRiskyActionisTaken

44%

Itisconvenient

24%

Tomeetanurgentdeadline

11%

Toachievearevenuetarget

5%

Other,pleasespecify

Tosavetime

19%

39%

Tosavemoney

10%

Tomeetotherperformanceobjectives

Nobodyknowsthisbetterthantheworld’scybercriminals.Theyunderstandthatpeoplecanbeexploited,eitherthroughnegligence,obliviousnessor—inrareinstances—malice.Socialengineeringisapartofalmosteveryemailthreatanalyzedbyourresearchers.And58%ofuserswhotookariskyactionsaid

theyengagedinbehaviorthatwouldputthematriskofbasicsocialengineeringtactics,suchasclickingonunknownlinks,respondingtounfamiliarsendersandsharingcredentialswithuntrustworthysources.Theseactionscanleadtoransomwareinfection,malware,databreachorfinancialloss.

Oneofthereasonsuserstaketheserisksisalackofconsensusaboutaccountabilityandresponsibility.Only41%ofuserssaidtheyknowthattheybearresponsibilityforcybersecurityattheirworkplace.About7%claimedthattheyaren’tresponsibleatall,whilethemajority(52%)weren’tsure.

PerceptiononSecurityResponsibility

41vs.85

7vs.13

52vs.2

Yes–Employeesthinktheyareresponsibleforsecurity

No–Employeesbelievesecurityisnottheirresponsibility

Notsure

Employees

SecurityProfessionals

63

ofsecurityprofessionals

rateduserswithaccesstocriticalbusinessdataasthetopcybersecurityrisk

Thiscontrastswiththeviewamongsecurityprofessionals,85%ofwhomsaythatmostemployeesknowtheyareresponsibleforsecurity.Thisgapbetweenperceptionandrealitysuggeststhatthereisaneedforclearercommunicationaboutsharedresponsibility,ratherthanjustmoretrainingonsecuritybestpracticesandpolicies.

Theprofessionalview

Securityprofessionalsunderstandablyhaveadifferentperspectiveonsecurityriskstoendusers.Theyaremoreawareofthethreatlandscapeandtheconsequencesofabreach.Andtheyhave

amorenuancedunderstandingofthechallengesthatgointosecuringcomplexanddynamicenvironments.Theyalsohavetheunenviabletaskoffindingwaystobalancetheneedforsecuritywiththeneedforunhinderedproductivityandefficiency.

Accordingtooursurveyofsecurityprofessionals,theyrateuserswithaccesstobusiness-criticaldataasthebiggestsecurityrisk(63%)—agroupthatisinevitablyhardtomanage,asmuchofthataccessisnecessary.Butclick-happy

usersandthosewhodon’tcompletesecurityawarenesstrainingareclosebehindinjointsecondplace(56%each).Thesecategoriesofuserwereallconsideredsignificantlymoreriskythanexecutives/VIPs(34%),despitethelattergroupoftenhavingbroadaccesstovaluabledata.

UsersWhoRepresentRisk

Userswhohavebusinessprivilegeandaccesstocriticaldata

Userswhoareclickhappy

Userswhoconsistentlyfailtocompletetrainingassignment

Suppliersorbusinesspartners

Peoplewhoareleaving

42%

VIPs,executives

34%

49%

56%

56%

63%

Unfortunately,oursurveyrevealssignificantoverlapbetweentheriskiestbehaviorsidentifiedbysecurityprofessionalsandthemostcommonriskyactionstakenbyendusers.Reusingpasswords,usingworkdevicesforpersonalactivitiesandaccessinginappropriatewebsitesareamongbehaviorsconsideredthemostunsafe;allofthemappearedinthetopactionstakenbyusers.

Rank

TopRisksConsideredbyInfosec

TopRiskyActionsTakenbyUsers

1

ClickonlinksordownloadattachmentsfromsomeoneIdon’tknow

Useworkdeviceforpersonalactivities

2

Reuseorsharepassword

Reuseorsharepassword

3

Accessinappropriatewebsite

ConnectwithoutusingVPNatapublicplace

4

Uploadsensitivedatatounproventhird-partycloud

Respondtoamessage(emailorSMStext)fromsomeoneIdon’tknow

5

Useworkdeviceforpersonalactivities

Accessinappropriatewebsite

Thisoverlapsuggeststhatusersmaybetakingsomeoftheseactionsbecausetheyareunawareofjusthowriskytheyareconsideredbysecurityteams.

SecurityAwarenessTrends

Whiletrainingaloneisn’tenoughtochangeunsafebehavior,teamsthatlackbasicsecurityawarenesstoolsandknowledgearestillmuchmorelikelytofallpreytocybercriminals.But

asnewsocialengineeringluresandtechniquesappearonthethreatlandscape,awarenessprogramsmustbeagileandbroad-basedtoremainrelevant.

Currentstateofsecurityawareness

Firstsomepositivenews:99%ofrespondentssaidtheyhaveasecurityawarenessprogramofsomesortupandrunning.Butwhilethebasicsmayalreadybeinplace,manyarestrugglingtodriverealbehavioralchange.Apossiblereasonforthisisthatonly53%saytheytraineveryoneintheorganization(downfrom56%lastyear).Thismeansthatsomeusersmaybeleftoutoftheloopormayreceiveinadequateoroutdatedtraining.

SecurityAwarenessActivitiesAssignment

Everyoneintheorganization

28%

Onlyspecificdepartmentsandroles

6%

Onlyspecificindividuals

Notsure 1%

1%

15%

41%

2023

53%

2022

56%

Anotherchallengeisthecoverageandrelevanceoftrainingtopics.Securityprofessionalsagreethatremotework,passwordhygieneandinternetsafetyarecritical,butlessthanathirdofsecurityawarenessprogramscoverallthese

topics.Thetoptrainingtopicscitedbyrespondentsweremalware,Wi-Fisecurity,ransomwareandemailphishing,whichareallimportant,butnotsufficient

toaddressthefullspectrumofrisks.Andaswe’llseelaterwhenweexaminethelatestcybercriminaltacticsandtechniques,emergingthreatscanquicklybecomecommonplace,takingunpreparedusersbysurprise.

41 from28

Thepercentageoforganizations

thattrainedspecificrolesjumpedyearoveryear

Onthepositiveside,thesurveyshowssomesignsofimprovementandinnovationinsecurityawarenesstactics.Yearoveryear,trainingofspecificrolesanddepartmentshasrisensignificantly(41%from28%),indicatingamoretailoredandtargetedapproach.Timeallocatedtousereducationhasalsoincreasedyearoveryear,withmorerespondentsdedicatingoverthreehoursperyeartoawarenesstraining.Overall,theaverageamountoftimededicatedtoawarenesstraininghasincreasedforthefirsttimeinthreeyears.

TimeAllocatedforSecurityAwarenessActivities

6 25

17 37

15

30minutesorless31–59minutes

1–2hours

3–4hours

Morethan4hours

Cybersecurity-basedcontestsandprizes

33%

Smishingandvishingsimulations

33%

SimulatedUSBdrops

23%

Internalcybersecuritychatchannel

30%

Internalwiki

23%

Mycompanydoesnothaveasecurityawarenessprogram

1%

Thetypesoftacticsbeingusedareevolving,too,witha23%increaseintheuseofcontestsandprizestogamifyandincentivizeattention.Thischangecanhelpincreaseuserengagementandmotivation,whilealsocreatingapositiveandfunlearningenvironment.Computer-basedtrainingremainsthemostcommonformat(45%),butothermethodssuchassimulatedUSBdrops,videos,postersandnewslettersarealsobeingused.

In-persontrainingsessions

37%

Virtual,instructor-ledtraining

34%

Computer-basedtraining

45%

Simulatedphishingattacks

34%

Awarenesspostersandvideos

31%

Newslettersandemails

38%

However,only34%ofrespondentssaytheyperformsimulatedphishingattacks,despitethehighvolumeofmaliciousemailseeninthethreatlandscape.Thissuggeststhatthereisstillroomforimprovementinthecompositionofmostsecurityawarenesstrainingsyllabuses.

83

ofsurveyedsecurity

professionalsimplementmoretrainingtodrivebehaviorchange

81

implementmorecontrols

orrestrictions

Areasforimprovement

Securityisnotonlyatechnicalissue,butalsoaculturalandorganizationalone.Itrequiresthecollaborationandcommitmentofallstakeholders,fromsecurityprofessionalstoendusers.However,thereisoftenagapbetweenwhatsecurityprofessionalsthinkiseffectiveandwhatenduserssaywouldmotivatethemtoprioritizesecurity

Accordingtooursurvey,securityprofessionalsbelievethatmoretraining,tightercontrols,closerbusinessalignment,betterrewardsandstrongerchampioningofsecurityinitiativeswouldallbeeffectiveinimprovingsecurity.

However,fewerthanathirdoforganizationsrewardpositiveuserbehaviorsorchampionsecurityinitiatives.Theseareimportantwaystorecognizeandreinforcegoodsecuritypractices,andtoensurethatallemployeesareinvestedincreatingasecurity-awareculture.

Rank

ActionsTakenbySecurityPros

UserMotivation

1

Providemoretraining

Makingsecurityeasierforme

2

Implementmoresecuritycontrolsorrestrictions

Usingrewardsandrecognition

3

Alignsecurityinitiativeswithbusinesspriorities

Increasedengagementwithleadershipandsecurityteams

Incontrast,usersoverwhelminglysaythattheywantsecuritytobemadeeasier.Theywantprocessestobemoreuser-friendly,convenientandtransparent,andtheywanttohavemorecommunicationandfeedbackfromsecurityexperts.Usersoverwhelminglyagree(94%)thatimprovingeaseofusewouldmotivatethemtobemoreattentivetosecurity.Thesedisparitiesbetweensecurityteamactionsandusermotivationsclearlydemonstratetheneedforopencommunicationbetweensecurityteamsandendusers.

Makingsecurityeasierforme

Usingrewardsorrecognition

Increasedengagementfromleadershiporsecurityteam

Moretrainingordifferent

stylesoftraining

Punishment,suchasreductioninpay,bonusremoval,jobtermination

WhatPoliciesMotivateUserstoPrioritizeCybersecurity

94%

6%

89%

11%

87%

13%

85%

15%

71%

29%

Motivating NotMotivating

Inkeepingwithtrendswe’veobservedoverthepastfewyears,punishingunwantedbehaviorwasconsideredtheleasteffectiveapproachbysecurityprofessionals.Fortunately,itwasalsotheleastimplemented.Punishmentcanhavenegativeeffects,suchascreatingfear,resentmentanddistrust,andreducingmotivationandmorale.Itcanalsodiscourageusersfromreportingincidentsorseekinghelp,whichcanseriouslyincreasetheriskofsecuritybreaches.Punishmentwasalsotheleastmotivatingresponseamongendusers,though71%stillagreedthatthiswouldbeanincentiveforthem.Thissuggeststhatsomeusersmaybewillingtocomplywithsecurityrulestoavoidnegativeconsequences,thoughitisunlikelythatcompelledparticipationwillleadtoenduringbehaviorchange.

2024STATEOFTHEPHISH\REPORT

TheThreatLandscape

Cybersecurityisaconstantlyevolvingfieldascybercriminalsdevisenewandsophisticatedwaystoattackpeopleandbreachorganizations.Userswhotakerisks,suchasclickingonsuspiciouslinks,openingunknownattachmentsorusingweakpasswords,faceanincreasingvarietyofreal-worldthreatsfromattackers.

Threatprevalence

Someofthemostcommonformsofattackreportedbysurveyparticipantswerephishing,businessemailcompromise(BEC)andransomware.Whileeachofthesetechniquesisdistinct,securityteamswilloftenencounterthemasindividualcomponentsofanextendedattackchain,withphishingleadingtoransomware,orasupplychainattackleadingtoBEC.

PrevalenceofAttacks

76%

BulkPhishing USBDrop

SpearPhishing

BEC

Ransomware

74%

74%

73%

75%

85%

SociaMedia

SupplyChainRisk

DataLossviaExternalAttacker

%

60%

65

72%

74%

69%

69%

Smishing

67%

71%

Vishing

77%

76%

75%

76%

DataLossviaInsider

TOAD(CallbackPhishing)

66%

68%

64%

66%

67%

2023 2022

However,thesearen’ttheonlythreatsthatusersandorganizationsneedtobeawareof.Accordingtoourowndata,manynovelattacktypesarebecomingincreasinglyprominent.

14

2024STATEOFTHEPHISH\REPORT

Growingthreats:

TOAD,MFA-Bypass,QRcodesandgenerativeAI

Intelephone-orientedattackdelivery(TOAD),themaliciousmessageoftenappearstobecompletelybenign,containingnothingmorethanaphonenumberandsomeerroneousinformation.Itisn’tuntiltheunsuspectingvictimcallsthelistednumberforhelpthattheattackchainisactivated.Cybercriminalcallcentersareoperatingaroundtheworld,guidingvictimsintograntingremoteaccess,revealingsensitiveinformationandcredentials,oreveninfectingthemselveswithmalware.Ourdatarevealsthatanaverageof10millionTOADmessagesaresenteverymonth.

13million

Proofpointsawover13M

TOADattacksatpeakinAugust2023

89

Anotherincreasinglypopularattackmethodinvolvesusingadvancedtechniquestobypassmultifactorauthentication(MFA),whichisnowastandardpartofcorporatecybersecurity.TheseattackstypicallyuseproxyserverstointerceptMFAtokens,allowingattackerstocircumventtheadditionallayerofsecurityprovidedbyone-timecodesandbiometrics.Severaloff-the-shelfphishkitsnowincludeMFAbypassfunctionality,allowingevenrelativelyunsophisticatedattackerstobenefit.Weseearound1millionphishingthreatsusingthepopularEvilProxyframeworkeverymonth.Thisisofparticularconcern,as89%ofsecurityprofessionalsstillconsiderMFAtobeasilverbulletforprotectionagainstaccounttakeover,with84%ofrespondentssayingtheirorganizationsuseMFAtopreventaccounttakeover.

DoesMFAProvideCompleteProtectionAgainstAccountTakeover?

Completelyagree

ofsecurityprosbelievethatMFA 9

canprotectagainstaccount 1

compromisecompletely 2

42

47

Somewhatagree

NeitheragreeordisagreeSomewhatdisagreeCompletelydisagree

Andwithintheparadigmoftraditionalphishing,attackersarefindingnewwaystoembedmaliciouscontent.Inrecentmonthswe’veseenanincreaseintheuseofQRcodesasanalternativetolinksorattachments.Thistechniqueisparticularlydangerous,asitbothattemptstoevadeautomateddetectionwhilepresentinguserswithafamiliarformatinacontexttheymaynothaveseenbefore.ItisalsoimpossibletotelljustbylookingifaQRcodeleadstoaphishingsiteormalwaredownload.UnfamiliarusersscanningaQRcodemaynotevenbeawarethatthey’veengagedwithapieceofmaliciouscontentuntilit’stoolate.

15

It’salsoworthnotingthateventheleastcommontypeofattack—USBdrop—wasstillreportedby60%ofrespondents.Thisshowsthatcybercriminalsarewillingtotryanytactic,oldornew,iftheythinkitwillgivethemachancetoexploitanunsuspectingvictim.

Despitethegrowingprominenceandsophisticationofthesethreats,manyorganizationsarenotadequatelypreparedortrainedtodealwiththem.Only23%oforganizationstraintheirusersonhowtorecognizeandpreventTOADattacks,andonly23%educatetheirusersongenerativeAIsafety.

GenerativeAIisatechnologythatcancreaterealisticandconvincingcontent—suchasimages,videosortext—basedonagivenpromptordatainput.Thistechnologypromisestoenhancesocialengineeringforallmessaging-basedattacks,asattackerscanuseittoimprovethequalityoftheirlure,particularlywhentargetingotherlanguages.Moreover,generativeAIalsoposesariskofdataloss,asthereiscurrentlylittletransparencyoverwhathappenstodatathatisuploadedtoservicessuchasChatGPTandGoogleBard.

BECattacksbenefitfromAI

BECattacksalsocontinuetoposeaseriousthreat,especiallyinnon-English-speakingcountries.FewerorganizationsreportedBECattemptsglobally,butattackscontinuetogrowinprevalenceamongcountriessuchasJapan(35%year-over-yearincrease),Korea(31%jump),andUAE(29%jump).These

countriesmayhavepreviouslyseenfewerBECattacksduetolanguagebarriers,culturaldifferencesorlackofvisibility.ButthereisnowalikelylinkbetweenBECandgenerativeAI,asattackerscanusethelattertocreatemoreconvincingandpersonalizedemailsinmultiplelanguages.Ourowndatashowsanaverageof66milliontargetedBECattackseverymonth.

68million

maliciousmessagesincluded

referencestoMicrosoftand/orMicrosoftproductsin2023,makingthesoftwaregianttheworld’smostabusedbrand

Microsoftremainsmost-abusedbrand

Brandabuseisafavoritetacticforphishingandmalwaredelivery,asattackersexploitthetrustandfamiliaritythatusershavewithcertainbrands.Morethan68millionmessageswereassociatedwithMicrosoftproductsandbrandin2023,makingitthemostabusedbrandbycybercriminals.AdobeandDHLroundedoutthetopthree,butatfewerthan10millionmessageseach.

68

9.4

8.8

6.1

BrandAbuseThreats(Millions)

20million

Office365wasthemostabused

Microsoftproductinmaliciousemail,withover20millionemailthreatsusingthebrand

4.4

3.5

3.1

Microsof

t

Adobe

DHL

Google

AOL

DocuSign

Amazon

Ransomwarestillamajorconcern

Thepercentageoforganizationsthatfacedaransomwareattackrose5percentagepointsto69%.Almost60%oforganizationsreportedfourormoreseparateransomwareincidentsinayear,indicatingthatransomwareisstillapersistentandlucrativeformofattack.

RansomwarebytheNumbers

39

3 38

5

15

1–3separateincidents

4–6separateincidents

7–9separateincidents

10ormoreseparateincidentsUnsure

Oneofthewaysthatorganizationstrytomitigatetheriskandimpactofcyberattacksisbypurchasingcyberinsurance,whichcoversthecostsanddamagesassociatedwithacybersecurityincident.Amongthosethathadexperiencedaransomwareincident,96%nowhavecyberinsurance.Mostinsurers(91%)helpedwithransompayments,upfrom82%theyearbefore.However,globally,therateofpaymenttoransomwareattackershasdeclinedfrom64%to54%.

InfectedOrganizationsThatAgreedtoPayRansom

54%

58%

64%

2023 2022 2021

Thenumberofrespondentswhoregainedaccesstotheirdataafterpayingalsodeclined,withthenumberwhoregainedaccessafterasinglepaymentseeingthelargestdecline.Thismaybeoneexplanationforthedropinpayments.Anotherpossiblereasonisthatorganizationsarebecomingmoreawareofthedrawbacksandrisksofpayingransoms,suchasencouragingmoreattacks,fundingcriminalactivitiesorreceivingcorruptedorincompletedata.

15

oforganizationsrefusedtopay

morethanoneransomaftertheirfirstpaymentdidn’tgettheirdataback,upfromjust6%in2022

RansomwareInfections:WhatHappensAfterPayment

41%

Regainedaccesstodataafterfirstpayment

41%

Paidadditionalransomdemand(s)andeventually

Refusedtopayaddtionalransomdemand(s)andwalked

6%

15%

43%

52%

Nevergotaccesstodataevenafterpayingransoms

1%

1% 2023

2022

Attackconsequences

Theimpactofphishingattacksonorganizationscanbedevastating,bothfinanciallyandreputationally.71%oforganizationsexperiencedatleastonesuccessfulphishingattackin2023,downfrom84%in2022.However,whiletheincidenceofsuccessfulphishingattackshasdeclined,someofthenegativeconsequenceshavesoared.Yearonyear,wesawa144%increaseinreportsoffinancialpenalties,suchasregulatoryfines,anda50%increaseinreportsofreputationaldamageduetophishingincidents.

73

oforganizationsreported

aBECattack,butonly

29

teachusersabout

BECattacks

ResultsofSuccessfulPhishingAttacks

Lossofdata/intellectualproperty

32%

33%

32%

Ransomwareinfection*

43%

29%

Breachofcustomer/clientdata

44%

27%

Credential/accountcompromise

Advancedpersistentthreat

23%

21%

22%

Directfinancialloss**

30%

Financialpenalty***

9%

22%

22%

Othermalwareinfection(s)

Reputationaldamage

18%

27%

36%

Zero-dayexploit

20%

20%

28%

Widespreadnetworkoutage/downtime

25%

26%

I’mnotsure

0%

2%

*malwarewasdeliveredviaemail

**wiretransferorinvoicefraud

***regulatoryfine

2023

2022

Thethreatlandscapeisconstantlyevolving,ascybercriminalsemploynewtacticsandtechniquesintheirquesttogainanadvantage.Thisiswhyit’skeytoequippeoplewiththeknowledgetheyneedtoidentifyandresistattacks;afterall,assophisticatedasthesetechniquesarebecoming,peopleremaintheirprimarytarget.Mostorganizationssaytheyusereal-worldthreatintelligencetoshapetheirsecurityawarenessprogram,howeverthereare

somemajordisparities.Forexample,73%oforganizationsexperiencedaBECattack,butonly29%trainusersspecificallyonBECthreats.Similarly,only23%oforganizationsprovidetrainingonTOADattacks,despitetheirubiquity.Thethreatlandscapemovesprettyfast;ifyoudon’tstopandupdateyourprogramonceinawhileyoucouldmisssomething.

2024STATEOFTHEPHISH\REPORT

OrganizationalBenchmarks

Oneofthewaysthatorganizationscanmeasureandimprovetheircybersecurityawarenessandresilienceisbyconductingphishingsimulations.Proofpointphishingsimulationsmimicreal-worldphishingscenariosandassesshowusersrespondtothem.Ourcustomersconducted183millionphishingsimulationsovera12-monthperiod.Ofthese,link-basedtestswerethemostcommon,accountingfor59%ofallsimulations,followedbydata-entrytests(30%)andattachment-basedtests(10%).However,attachment-basedtestshadthehighestfailurerateoverall,at17%.Failureratesforalltypesofsimulationswerewithin1percentagepointoflastyear’sresults.

SimulationTypeandFailureRate

66%

59%

2023frequenc

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論