Last month, a CFO at a manufacturing company wired $1.2 million to what he thought was a new vendor. The email came from his CEO's account. The language was perfect. The timing made sense - they'd discussed this partnership in a meeting just days before.
It was all fake. Attackers had compromised the CEO's email weeks earlier, read through months of conversations, and waited for the perfect moment to strike.
This is phishing in 2026. No typos. No Nigerian princes. Just patient, sophisticated social engineering that costs businesses billions.
What Is Phishing, Really?
Phishing is social engineering delivered at scale. Attackers impersonate someone you trust - your bank, your boss, Microsoft, Amazon - to trick you into handing over credentials, clicking malicious links, or transferring money.
The numbers are staggering. Cybercriminals send roughly 3.4 billion phishing emails every single day. In Q2 2025 alone, APWG tracked over 1.1 million phishing attacks. And the financial damage? IBM puts the average cost of a phishing-related breach at $4.88 million.
Here's what makes phishing so effective: it doesn't target technology. It targets people. And people are predictable when they're busy, stressed, or distracted - which describes most of us at work.
The Phishing Family: Different Attacks, Same Goal
Not all phishing looks the same. Understanding the variants helps you spot them.
Standard Phishing (Spray and Pray)
Mass emails sent to thousands or millions of addresses. Low effort, low success rate, but the volume makes up for it. Think "Your Amazon order couldn't be delivered" or "Unusual sign-in activity on your account."
These rely on probability. Send enough emails, and someone's bound to have an actual Amazon order they're waiting for.
Spear Phishing
Targeted attacks against specific individuals. Attackers research their targets - LinkedIn, company websites, social media - and craft personalized messages. Maybe they reference a recent conference you attended or mention a project you're working on.
The success rate jumps dramatically when the email feels like it's actually meant for you.
Whaling
Spear phishing aimed at executives. CEOs, CFOs, board members - people with authority to approve large transactions or access sensitive data. Higher effort, but the payoff can be enormous.
That $1.2 million wire transfer I mentioned? Classic whaling attack.
Business Email Compromise (BEC)
The attacker either compromises a legitimate email account or creates a convincing lookalike domain (think "company.co" instead of "company.com"). They insert themselves into real business conversations - usually involving payments or sensitive data.
BEC caused $2.77 billion in reported losses in 2024 alone. And that's just what got reported.
Smishing (SMS Phishing)
Same concept, different delivery mechanism. That text about a "package delivery issue" or "suspicious activity on your bank account" with a shortened link? That's smishing.
Text messages feel more urgent and personal than email. People let their guard down.
Vishing (Voice Phishing)
Phone calls from "Microsoft support" or "your bank's fraud department." Sometimes automated, sometimes live actors. Increasingly powered by AI voice cloning - 30% of organizations reported voice deepfake attempts in 2024.
When someone calls claiming there's a problem with your account and sounds exactly like someone from your bank, it's genuinely hard to stay skeptical.
Clone Phishing
Attackers take a legitimate email you've received, copy it exactly, swap out the link or attachment for something malicious, and resend it. "Resending this because the link was broken" or "Updated attachment attached."
If you already trusted the original message, you'll probably trust the clone.
Real Attacks, Real Damage
This isn't theoretical. Here's what phishing did in the past year:
Change Healthcare (February 2024): Attackers used compromised credentials (likely phished) to breach the largest healthcare payment processor in the US. Over 100 million people affected. UnitedHealth spent $2.87 billion responding and provided $6 billion in assistance to healthcare providers whose operations ground to a halt.
Marks & Spencer (May 2025): The "Scattered Spider" group hit the UK retail giant with ransomware delivered through social engineering. Online retail systems went down. Expected profit loss: $400 million.
Ahold Delhaize (November 2024): A breach at this food retail giant (Food Lion, Stop & Shop, Giant Food) compromised data on over 2.2 million people. E-commerce and pharmacy services disrupted.
Transport for London (2024): A 17-year-old compromised personal data of 5,000 customers, including banking details. Cost to TfL: approximately $40 million.
The pattern repeats: human error opens the door, and attackers walk right in.
How to Spot Phishing Before It Spots You
Attackers have gotten better, but phishing still leaves fingerprints if you know where to look.
Check the Actual Sender Address
Not the display name - the actual email address. "Microsoft Support" means nothing if the address is support@micros0ft-security.xyz. Hover over the sender name to see the real address.
Watch for lookalike domains: switched letters (rn instead of m), added words (microsoft-support.com), different TLDs (.co instead of .com).
Inspect Links Before Clicking
Hover over any link to see the actual destination. If an email claims to be from PayPal but the link goes to paypal-secure-login.randomdomain.com, that's your red flag.
Better yet: don't click links in emails at all. If your bank needs you to do something, open a new browser tab and go directly to their website.
Watch for Pressure Tactics
"Your account will be suspended in 24 hours." "Immediate action required." "Don't share this with anyone."
Urgency and secrecy are manipulation tactics. Legitimate organizations give you time to verify things. Attackers need you to act before you think.
Question Unexpected Requests
Your CEO asking you to buy gift cards? Your vendor suddenly updating their payment details? A coworker asking for your login credentials "for a project"?
Stop. Verify through a different channel. Pick up the phone. Walk to their desk. Use a known good number, not one provided in the suspicious message.
Look for Context Mismatches
An email about your "recent purchase" when you haven't bought anything. A delivery notification for a package you're not expecting. A password reset you didn't request.
These mismatches are your early warning system.
Be Skeptical of Attachments
Unexpected attachments - especially .zip files, Office documents with macros, or executables - should make you pause. When in doubt, confirm with the sender through another channel before opening.
Protecting Yourself and Your Organization
Recognition is half the battle. Here's how to build real defenses.
For Individuals
Enable MFA everywhere. Yes, attackers can sometimes bypass it (adversary-in-the-middle attacks jumped 146% in 2024), but MFA still blocks the vast majority of credential theft. Use app-based authentication over SMS when possible.
Use a password manager. Unique passwords for every account means a single phished credential doesn't compromise everything else.
Keep software updated. Many phishing attacks lead to malware. Updated software closes the vulnerabilities that malware exploits.
Verify unusual requests. "Trust but verify" is backwards. Verify first, especially for financial transactions or data sharing.
For Organizations
Deploy email security solutions. Modern email gateways catch obvious phishing. AI-powered tools are getting better at detecting sophisticated attacks. No solution catches everything, but you want to filter the obvious stuff automatically.
Implement DMARC, DKIM, and SPF. These email authentication protocols make it harder for attackers to spoof your domain. They won't stop all phishing, but they'll stop attackers from impersonating your own company to your employees and customers.
Require MFA for everything. Email, VPN, cloud applications, admin panels. No exceptions for executives - they're actually the biggest targets.
Run realistic phishing simulations. Regular testing keeps security awareness fresh. When someone fails a simulation, use it as a teaching moment, not a punishment.
Create clear reporting channels. Make it easy for employees to report suspicious emails. Fast reporting helps you identify and block active campaigns before they spread.
Establish verification procedures for financial transactions. Any change to payment details or wire transfer requests should require voice verification through a known number. This one step prevents most BEC losses.
You Got Phished. Now What?
It happens. Even security professionals fall for well-crafted phishing occasionally. What matters is how fast you respond.
Immediate Actions
Change your passwords. Start with the compromised account, then any accounts using the same password (you shouldn't have any, but be honest with yourself).
Enable MFA if you haven't. If attackers have your password, MFA might be the only thing standing between them and your account.
Check for unauthorized access. Review recent login activity, sent messages, and any changes to account settings. Attackers often add forwarding rules to maintain access even after you change your password.
Scan for malware. If you clicked a link or downloaded an attachment, run a full scan immediately. Consider having IT do a deeper inspection.
Report it. Tell your IT/security team. They need to know so they can protect others and watch for related attacks.
If Financial Information Was Compromised
- Contact your bank immediately
- Place a fraud alert on your credit reports
- Monitor your accounts for unauthorized transactions
- Consider a credit freeze
If Work Credentials Were Compromised
- Alert IT immediately - don't wait until morning
- Document what happened and when
- Disconnect from the network if instructed
- Preserve any evidence (don't delete the phishing email)
Document Everything
Write down what happened while it's fresh. What did the email say? What did you click? What information did you enter? This helps incident responders understand the scope and respond appropriately.
The Reality Check
Phishing isn't going away. AI is making attacks more convincing - 40% of BEC emails in Q2 2025 were AI-generated. Attackers are patient, creative, and constantly evolving.
But here's the thing: most phishing still works because people are rushing, trusting, or just not paying attention. That's actually good news, because it means the defense is largely within your control.
Slow down. Verify. Be skeptical of urgency. These habits won't make you immune, but they'll make you a much harder target.
And in security, sometimes being harder than the next target is enough.