Current Threat
68% of data breaches
involve a human factor.
No patch, no firewall protects if an employee clicks under time pressure. This page explains how phishing works - and how to protect yourself.
- of data breaches involve a human factor (Verizon DBIR 2024)
-
- Average cost per incident
-
- Click-rate reduction with training
-
- Decision time under pressure
-
Basics
What is Phishing?
Phishing is a social engineering attack in which attackers impersonate legitimate organisations or individuals to trick victims into revealing sensitive data, clicking malicious links or performing actions. The term derives from "fishing" - with humans as the catch.
What makes phishing so dangerous: it attacks people, not technology. No patch, no firewall and no antivirus fully protects if an employee under stress or time pressure clicks a link. This is why security awareness is just as important as technical countermeasures.
Phishing Types Overview
Email Phishing
Mass attacks via email with spoofed senders. The goal is to steal credentials, infect with malware or initiate payment fraud. Typical indicators: urgent calls to action, spoofed sender addresses, manipulated links.
Spear Phishing
Targeted attack on individuals or departments with personalised content from OSINT research. Much higher success rate than mass phishing - up to 70% click rate versus 3% for generic campaigns (Proofpoint State of the Phish 2025).
Whaling
Spear phishing specifically targeting executives (CEO, CFO, CISO). Attackers impersonate business partners, lawyers or authorities. Common goal: CEO fraud (Business Email Compromise) with wire transfer requests - average loss per incident according to FBI IC3: USD 125,000.
Smishing
Phishing via SMS with links to fake websites or malicious downloads. Parcel notifications, bank alerts and supposed authority messages are common lures. Particularly dangerous as mobile browsers often do not show the full URL.
Vishing
Voice phishing over the phone. Attackers pose as IT support, a bank, tax authority or Microsoft employees. Through social manipulation they obtain credentials or remote access. Combining with a prior email significantly increases credibility.
QR Code Phishing (Quishing)
QR codes in emails or print media leading to phishing sites. Particularly tricky: email gateways do not scan QR codes like URLs. The user scans with a personal smartphone that is often less protected than the corporate device. Rapidly growing attack vector since 2023.
Threat Intelligence
Current Phishing Methods 2025/2026
AI-powered attacks, deepfakes and new delivery channels are rapidly transforming the phishing landscape. What was a recognition indicator yesterday no longer works today.
AI-Generated Phishing Content
2025/2026LLMs such as GPT-4 enable error-free, stylistically convincing phishing emails in any language. Previous recognition indicators such as spelling mistakes and poor grammar are entirely absent. Attackers automatically personalise content based on LinkedIn, social media and company profiles.
Deepfake Voice & Video
2025/2026Synthetic voices and videos of CEOs or managers for whaling attacks and real-time vishing. In 2024 a company lost USD 25 million through a deepfake video call in which a finance employee failed to recognise the fake identity of their CFO (South China Morning Post, 2024).
Adversary-in-the-Middle (AiTM)
2024-2026Phishing frameworks such as Evilginx or Modlishka proxy real login pages in real time and steal session cookies - even behind MFA. The user sees the real website and enters real credentials which are directly captured. MFA provides only limited protection here.
QR Code Phishing in Documents
2024-2026QR codes in PDF attachments, invoices or printed parcel labels bypass email scanners entirely. Scanning with a personal smartphone leads to phishing sites outside corporate security controls.
Microsoft Teams / Slack Phishing
2023-2026Collaboration tools as a new attack vector: attackers contact employees via external guest invitations, fake system notifications or compromised partner tenants. Less suspicion than email - higher click rate.
Sources: Verizon DBIR 2024, Proofpoint State of the Phish 2025, IBM Cost of a Data Breach Report 2024, FBI IC3 Annual Report 2024, KnowBe4 Phishing Benchmark 2024.
Protection
Recognising Phishing: Checklist
Phishing emails are becoming increasingly convincing. This checklist helps identify suspicious messages - even when they appear legitimate at first glance.
The 3-Second Rule
Attackers rely on time pressure. If an email demands immediate action - stop for 3 seconds and ask: Would this organisation contact me this way? Does this request make sense in my context? This brief pause prevents the majority of phishing clicks.
Check the sender address carefully
Not just the display name but the full email address. Typosquatting like "amazon-service.net" is common.
Check link destination before clicking
Hover over links to see the real URL. On mobile: press and hold link for preview.
Question urgent calls to action
"Your account will be suspended" or "Immediate action required" are classic panic-inducing tactics.
Never open unexpected attachments
Even if the sender appears known - verify context through a separate communication channel.
HTTPS is not a security indicator
Over 80% of phishing sites now use HTTPS. The padlock only means encrypted transmission, not legitimacy.
Restrict form input to known domains
Only enter credentials on official, directly typed URLs - never via links from emails.
Call back on known numbers to verify
For unexpected payment requests or login prompts: call back on the known official number, never the one in the email.
Practical Example
Anatomy of a Phishing Email
This realistic reconstruction shows the typical warning signs of a phishing email. Watch how the 5 most common red flags are revealed step by step.
Dringende Sicherheitswarnung: Ihr Konto wurde eingeschränkt
Sehr geehrter Kunde,
im Rahmen unserer routinemäßigen Sicherheitsüberprüfung haben wir ungewöhnliche Aktivitäten in Ihrem Online-Banking-Konto festgestellt. Zum Schutz Ihrer Daten haben wir den Zugang zu Ihrem Konto vorübergehend eingeschränkt.
Bitte verifizieren Sie Ihre Identität innerhalb von 24 Stunden, um eine dauerhafte Sperrung Ihres Kontos zu vermeiden.
Halten Sie bitte Ihre Zugangsdaten, TAN-Nummer und Kreditkartendaten bereit, um den Verifizierungsprozess abzuschließen.
Mit freundlichen Grüßen
Thomas Weber
Abteilung Kontosicherheit
Deutsche Kredit Bank AG
Diese E-Mail wurde automatisch generiert. Bitte antworten Sie nicht auf diese Nachricht.
Deutsche Kredit Bank AG | Taunusanlage 12 | 60325 Frankfurt am Main
5 Warnsignale erkennen
Der Anzeigename sagt "Deutsche Kredit Bank AG", aber die echte Adresse ist service@dk-bank-sicherheit.com - eine fremde Domain, die nichts mit der Bank zu tun hat.
Ihre echte Bank kennt Ihren Namen. "Sehr geehrter Kunde" ist ein Zeichen für eine Massen-Phishing-Kampagne an tausende Empfänger.
"Innerhalb von 24 Stunden" und Kontosperrung - klassische Panikmacher-Taktik. Seriöse Unternehmen setzen keine so kurzen Fristen per E-Mail.
Der Button verspricht die offizielle Seite, aber die echte URL ist dk-bank-sicherheit.com/verify - eine Phishing-Domain. Immer Linkziel prüfen!
Kein seriöses Unternehmen fordert per E-Mail zur Eingabe von Passwörtern, TANs oder Kreditkartendaten auf. Niemals über E-Mail-Links einloggen.
Fahren Sie mit der Maus über die nummerierten Bereiche in der E-Mail, um die Warnsignale zu entdecken.
Technology
Technical Countermeasures
Technical controls significantly reduce the attack surface. No single protection is sufficient - defence in depth is the right approach.
DMARC (p=reject)
Domain-based Message Authentication, Reporting & Conformance prevents attackers from sending emails with your domain as the sender. Together with SPF and DKIM, DMARC forms the baseline protection. Without DMARC in p=reject, phishers can abuse your brand unchecked.
SPF & DKIM
Sender Policy Framework (SPF) defines which servers are allowed to send emails for your domain. DomainKeys Identified Mail (DKIM) signs emails cryptographically. Both are prerequisites for a working DMARC implementation.
Email Gateway with Sandboxing
Advanced email security solutions (Microsoft Defender for Office 365, Proofpoint, Mimecast) analyse links and attachments in isolated sandbox environments. URL rewriting enables real-time checking even after delivery.
Phishing-Resistant MFA (FIDO2)
FIDO2/WebAuthn-based authentication (hardware security keys, passkeys) is resistant to AiTM phishing. The authenticator binds to the origin of the website - on phishing domains authentication automatically fails.
DNS Filtering
DNS-based filtering blocks access to known phishing and malware domains - including on mobile devices. Solutions such as Cisco Umbrella or Cloudflare Gateway offer threat intelligence-backed categorisation.
Endpoint Detection & Response (EDR)
If a click occurs despite all prevention: EDR solutions detect post-exploitation activities (credential dumping, lateral movement) and can contain attacks before greater damage occurs.
The Human Defence Factor
Security Awareness as the Key
Technical measures alone are not enough. People remain the last safety net - and with the right training also the strongest line of defence.
Security awareness programmes relying solely on classroom instruction fade away ineffectively. Sustainable behaviour change comes from repeated, realistic exercises - exactly what continuous phishing simulation provides.
According to the KnowBe4 Phishing Benchmark Report 2024, the average click rate in companies without training is 34.3%. After 12 months of consistent simulation and accompanying training, it drops to 4.6%.
Effectiveness Comparison
Source: KnowBe4 Phishing by Industry Benchmark Report 2024
Average click-rate reduction
Our Service
AWARE7 Phishing Simulation - Managed Service
Fully automated monthly phishing campaigns with realistic scenarios, real-time dashboard and individual training module for every click.
Monthly Campaigns
Rotating phishing scenarios - email, SMS, QR code, Teams - fully automated.
Real-Time Dashboard
Click rates, reporting rates and departmental analyses viewable live - for security managers and management.
Instant Training
Anyone who clicks immediately sees an educational explanation - no shaming, just targeted micro-learning.
Legally Compliant Setup
Guidance on works council agreements, GDPR-compliant evaluation, anonymised reports on request.
How the Onboarding Process Works
- 1 Kickoff call: define goals, technical setup, works council briefing
- 2 Template selection: scenarios from over 800 prepared templates or custom creation
- 3 First campaign: baseline measurement to establish current security level
- 4 Monthly campaigns: automated, with rotating scenarios and difficulty levels
- 5 Quarterly review: evaluation call with trend analysis and action recommendations
Phishing Simulation for Which Organisations?
- SMEs from 25 employees
Cost-efficient managed service option without own platform licence.
- Organisations under NIS-2 requirements
Phishing simulation as evidence for security training under NIS-2 Art. 21.
- Financial and healthcare sector
Industry-specific scenarios (SWIFT emails, patient data, banking portals).
- Organisations after a security incident
Targeted re-training of affected departments after a phishing incident.
FAQ
FAQ: Phishing & Phishing Simulation
What is the difference between phishing and spear phishing?
Does two-factor authentication (2FA/MFA) protect against phishing?
What does a phishing attack cost a company on average?
What is a phishing simulation and how does it work?
How often should phishing simulations be conducted?
Which technical measures are most effective against phishing?
What should I do if I have fallen for a phishing email?
Can companies conduct phishing simulations without employee consent?
Aus dem Blog
Weiterführende Artikel
Alle ArtikelStart a Phishing Simulation
Find out how well your team is equipped against phishing - with a realistic, anonymised baseline campaign. No shaming, just genuine learning.
Kostenlos · 30 Minuten · Unverbindlich