Explore the latest phishing trends for 2025, from AI-generated emails and quishing to deepfake vishing, and learn how to harden your defences.
Phishing remains the entry point for many data breaches and ransomware incidents. Human error, time pressure and clever social engineering continue to give attackers leverage, even as organisations invest in advanced email security.
In 2024, Proofpoint’s State of the Phish report found that more than two-thirds of surveyed employees took risky actions such as clicking malicious links or opening unknown attachments, contributing to a sharp rise in direct financial penalties and reputational damage from phishing incidents.
As of early 2025, several trends are reshaping how phishing campaigns are executed and where defenders should focus. This article looks at what is new, what still works for attackers and how to adapt your phishing defence strategy accordingly.
Generative AI has moved from proof of concept to everyday tool in phishing campaigns. Recent analyses of phishing seasons in 2025 highlight that attackers are increasingly using AI to craft highly personalised emails that mimic internal communication styles, respond to previous email chains and even adjust language to local norms.
Key characteristics include:
For defenders, this reinforces the importance of layered controls: email security that uses behavioural and machine-learning-based analysis, phishing-resistant MFA to protect accounts even when credentials are compromised, and targeted awareness that teaches employees to look beyond superficial language quality.
DACTA’s piece The Dark Side of AI: How Are Cybercriminals Exploiting Machine Learning discusses broader AI-driven threats and how to embed AI risk into your security strategy.
QR code phishing, often called “quishing”, has accelerated sharply as organisations embrace QR codes for payments, check-ins and authentication. Research in early 2024 indicated that around 12 percent of phishing emails already contained QR codes. Abnormal Security found that executives received more than forty times more QR code attacks than the average employee, reflecting their attractive risk profile.
By 2025, national fraud agencies in multiple countries have reported growing financial losses linked to QR scams, including cases where fake QR codes on parking machines and public signage drove victims to spoofed payment sites. Unit 42 researchers have also observed new techniques such as using legitimate websites’ redirect mechanisms and cloud-based verification tools to hide the final phishing destination.
Defenders should:
Voice phishing (vishing) has been around for years, but deepfake voice technology has changed the stakes. Recent threat intelligence reports show deepfake-enabled vishing increasing by more than a thousand percent between late 2024 and early 2025, with projected global fraud losses in the tens of billions.
Recent cases highlight:
To mitigate this, organisations should:
Email remains the primary delivery vector for phishing, but data from simulated and real attacks in 2025 shows a growing share of attacks delivered through SMS, messaging apps, collaboration tools and social media.
Common patterns:
This multi-channel reality means “email security” alone is not enough. Security teams must:
Despite the new techniques, many successful attacks still rely on familiar tactics:
Proofpoint and other threat intelligence providers consistently observe that basic credential theft and BEC remain prevalent, even as attackers adopt AI and QR codes. The difference is that these lures are now better written, more targeted and more seamlessly integrated into normal communication flows.
This underscores the value of robust fundamentals: email authentication (SPF, DKIM, DMARC), attachment sandboxing, URL rewriting and phishing-resistant MFA.
A modern phishing defence strategy should balance technology, process and people.
Consider prioritising:
For more guidance on technical controls and tooling, see DACTA’s The Ultimate Cybersecurity Toolkit for 2025, which covers endpoint, network and advanced threat detection measures, including MDR and AI-powered analytics.
Mobile-focused protections discussed in CSA’s Recommended Security Apps to Protect Your Mobile Device in Singapore & Beyond can also help mitigate phishing on phones and tablets.
Phishing in 2025 is no longer about spotting spelling mistakes. It is a dynamic blend of AI-generated content, QR codes, deepfake audio and multi-channel delivery, all aimed at exploiting human trust and urgency.
Organisations that succeed will be those that:
DACTA Global supports this shift through advisory services, detection engineering and managed security offerings that closely integrate with your awareness and training efforts. If your phishing defences still look like they did in 2020, now is the time to update them for the AI-driven, multi-channel threats of 2025.
If you're experiencing an active security incident and need immediate assistance, contact the DACTA Incident Response Team (IRT) at support@dactaglobal.com.