Kaspersky finds most effective phishing emails imitate corporate messages, delivery notifications
Almost one in five employees clicked links in business related emails, but most emails containing threats or promising money were identified as phishing
Kaspersky Lab has used phishing simulator data in a study that has revealed employees are most likely to click on a phishing link within an email if the subject line and sender appear to relate to work or a missed delivery.
The most effective phishing email in the study carried the subject line “Failed delivery attempt - Unfortunately, our courier was unable to deliver your item,” with 18.5% of people sent the email clicking the link it provided.
Using the Kaspersky Security Awareness Platform, system administrators can mimic phishing emails and send them without warning to employees. The results can then be tracked to indicate the level of security awareness amongst employees.
Other effective subject lines included “Emails not delivered due to overloaded mail servers,” “Online employee survey: What would you improve about working at the company,” and “Reminder: New company-wide dress code,” all of which prompted 17.5-18% of recipients to click their links. The most effective sender names included “Mail delivery service,” “The Google support team,” and “HR Department.”
Kaspersky’s study was conducted between January 2021 and May 2022 and included the results of over 29,000 employees from 100 countries. With phishing emails behind an estimated 91% of all cyberattacks, the importance of understanding those campaigns that employees will fall for the easiest cannot be overstated.
Conversely, emails that contained threats or promised rewards for clicking links were less likely to prompt clicks with “I hacked your computer and know your search history” and another promising $1,000 only gained 2% and 1% of clicks respectively.
Educating employees on the telltale signs of a phishing campaign can be an effective measure against cyberattacks. Communicating the importance of verifying links and sender addresses, checking attachments aren’t executable files, and flagging up any suspected phishing attacks to your company's IT department can greatly improve safety.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
On an administrative level, IT teams should remain vigilant against novel attacks that might circumvent existing security filters. Simulations such as those achievable through Kaspersky Security Awareness Program can provide useful insights into how susceptible employees are to tricks by threat actors.
Securing endpoints amid new threats
Ensuring employees have the flexibility and security to work remotely
“Since the methods used by cybercriminals are constantly changing, the simulation has to reflect up-to-date social engineering trends, alongside common cybercrime scenarios,” stated Elena Molchanova, Head of Security Awareness Business Development at Kaspersky.
“It is crucial that simulated attacks are carried out regularly and supplemented with appropriate training – so users will develop a strong vigilance skill that will allow them [to] avoid falling for targeted attacks or so-called spear phishing.”
Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.