AI is helping drive a sharp rise in phishing attacks, Cofense says

March 22, 20262 min read2 sources
Share:
AI is helping drive a sharp rise in phishing attacks, Cofense says

Phishing volume has doubled over the past year in Cofense telemetry, according to reporting by Infosecurity Magazine, with the email security vendor tying part of that increase to generative AI. The company said attackers are using AI to produce more polished, personalized and convincing phishing emails at greater scale.

The claim should be read as a vendor-observed trend rather than a measurement of all global phishing activity. Still, it matches broader warnings from security firms and government agencies that large language models are lowering the effort needed to write believable lures, translate scams into multiple languages and quickly generate variations designed to slip past basic filters.

What AI appears to change most is not the core phishing playbook, but the speed and quality of execution. Attackers can tailor messages to a target’s role, geography or employer, mimic internal business language more closely and iterate on subject lines or call-to-action text much faster than before. That matters because many users were once trained to spot obvious grammar mistakes and awkward phrasing, signals that are less reliable when AI is involved.

For defenders, the practical risk is higher success rates for credential theft, business email compromise and malicious OAuth consent requests. Sectors with frequent email-based approvals, including finance, healthcare, education and government, may face more convincing impersonation attempts aimed at payroll, procurement, HR and IT help desks.

The trend also reinforces a point many researchers have made since 2023: AI is improving phishing efficiency more than creating a new attack type. Criminals still rely on familiar methods such as spoofed senders, lookalike domains and fake login pages, but AI can make those campaigns cheaper to run and harder to spot. Organizations are being pushed toward stronger identity controls, including phishing-resistant MFA, tighter approval workflows and better detection for anomalous sign-ins after credential theft. Users connecting over public networks should also treat account security and a trusted VPN as basic hygiene, though email and identity defenses remain the primary control here.

Share:

// SOURCES

// RELATED

Enterprise cybersecurity software fails 20% of the time, warns Absolute Security

A new report finds 20% of enterprise security tools are failing due to poor patch management and IT complexity, leaving organizations dangerously expo

6 min readApr 1

The FCC's router ban: A necessary security measure or the wrong fix?

The FCC put foreign-made consumer routers on its prohibited list to protect national security, but critics argue the ban creates a false sense of secu

6 min readApr 1

Trivy hack spreads infostealer via Docker, triggers worm and Kubernetes wiper

A hypothetical supply chain attack on the Trivy security scanner via Docker Hub highlights a severe threat involving an infostealer, worm, and a Kuber

6 min readApr 1

We found eight attack vectors inside AWS Bedrock. Here's what attackers can do with them

Security researchers have uncovered eight critical attack vectors in AWS Bedrock, Amazon's AI platform, revealing how its deep enterprise integration

7 min readApr 1