-Content by CyberNewswire-
, a leader in identity threat protection, today released new data showing a sharp rise in phishing attacks that disproportionately target corporate users. The company tracked a 400% year-over-year increase in successfully phished identities, with nearly 40% of the 28+ million recaptured phished records containing a business email address compared to just 11.5% in recaptured malware data. The result is a warning to enterprises that their workforce is three times more likely to be targeted with phishing attacks than infostealer malware.聽
The findings reinforce a growing shift in cybercriminals鈥 strategy: phishing is now the preferred gateway into enterprise environments, and SpyCloud sees this trend continuing in 2026. Threat actors are using this access as a launchpad for follow-on attacks, with SpyCloud reporting in its 2025 Identity Threat Report that phishing is now the leading entry point for ransomware, accounting for 35% of all ransomware infections.聽
鈥淧hishing is now one of the most scalable tools cybercriminals use to breach enterprise environments,鈥 said Trevor Hilligoss, SpyCloud鈥檚 Head of Security Research. 鈥淐ybercrime enablement services, like phishing-as-a-service kits that automate convincing lures and adversary-in-the-middle tactics that capture MFA tokens and session cookies, put advanced tactics into the hands of low-skilled actors, making it easier than ever to compromise users at scale. SpyCloud鈥檚 visibility into these campaigns gives organisations a critical edge, helping them detect who鈥檚 been targeted and what data has been exposed聽and remediate those credentials before they can be weaponised.鈥
SpyCloud is the only provider recapturing and automatically remediating successfully phished identity data and targeting lists at scale before follow-on attacks like ransomware, fraud, and account takeover can occur.
More from Cybersecurity
- ShinyHunters Just Hacked Rockstar Through A Supplier 鈥 Every Business Using Third-Party Software Should Pay Attention
- Is Vibe Coding Safe Or A Cybersecurity Disaster Waiting To Happen?
- Anthropic Is Taking On Cybersecurity With AI, And It Has Brought Apple and Amazon Along For The Ride
- External Attack Surface Management And Why It Matters For Startups
- SpyCloud鈥檚 2026 Identity Exposure Report Reveals Explosion Of Non-Human Identity Theft
- The Aura Data Breach Exposed 900,000 Users 鈥 Here Is What Every Business Needs To Know
- How AI And Hacking Professionalism Are Overwhelming Endpoint Security
- Navigating The Hidden Dangers Of USB Devices In The Modern Workspace
鈥淢any organisations rely on traditional defenses like email filtering, endpoint protection, and employee education to stop phishing and malware attempts, but those tools only go so far,鈥 said Damon Fleury, SpyCloud鈥檚 Chief Product Officer. 鈥淎ttackers are still getting through and when they do, it鈥檚 the exposed identity data that enables further harm. Security teams need to be vigilant about what鈥檚 already been compromised and circulating in the criminal underground. Prevention is important, but without real-time visibility and post-compromise remediation, it鈥檚 not enough.鈥
While phishing has become a dominant entry point, malware remains a critical threat vector. In the age of remote work and bring-your-own-device policies, personal exposures are increasingly used to compromise enterprise environments.
A recent example is the 2025 Nikkei breach, where malware on a personal device led to the compromise of sensitive corporate data.
Despite only 11.5% of recaptured malware infections exfiltrating business email addresses directly, SpyCloud data shows that nearly 1 in 2 corporate users have been the victim of an infostealer malware infection in their digital history, whether that be on a managed or unmanaged device, a strong indicator that threat actors are moving laterally from personal to corporate accounts.
鈥淧rotecting the enterprise means looking beyond corporate accounts,鈥 Fleury added. 鈥淒ue to the continuous reuse of passwords and shared identity data across work and personal accounts like mobile numbers, the line between a user鈥檚 personal digital history and their professional access effectively no longer exists. That鈥檚 why it鈥檚 essential to monitor and remediate exposures across the full spectrum of an individual鈥檚 digital identity; personal and professional.鈥
-This is a paid press release published via CyberNewswire-