AI is helping drive a sharp rise in phishing attacks, Cofense says

March 22, 20262 min read2 sources
Share:
AI is helping drive a sharp rise in phishing attacks, Cofense says

Phishing volume has doubled over the past year in Cofense telemetry, according to reporting by Infosecurity Magazine, with the email security vendor tying part of that increase to generative AI. The company said attackers are using AI to produce more polished, personalized and convincing phishing emails at greater scale.

The claim should be read as a vendor-observed trend rather than a measurement of all global phishing activity. Still, it matches broader warnings from security firms and government agencies that large language models are lowering the effort needed to write believable lures, translate scams into multiple languages and quickly generate variations designed to slip past basic filters.

What AI appears to change most is not the core phishing playbook, but the speed and quality of execution. Attackers can tailor messages to a target’s role, geography or employer, mimic internal business language more closely and iterate on subject lines or call-to-action text much faster than before. That matters because many users were once trained to spot obvious grammar mistakes and awkward phrasing, signals that are less reliable when AI is involved.

For defenders, the practical risk is higher success rates for credential theft, business email compromise and malicious OAuth consent requests. Sectors with frequent email-based approvals, including finance, healthcare, education and government, may face more convincing impersonation attempts aimed at payroll, procurement, HR and IT help desks.

The trend also reinforces a point many researchers have made since 2023: AI is improving phishing efficiency more than creating a new attack type. Criminals still rely on familiar methods such as spoofed senders, lookalike domains and fake login pages, but AI can make those campaigns cheaper to run and harder to spot. Organizations are being pushed toward stronger identity controls, including phishing-resistant MFA, tighter approval workflows and better detection for anomalous sign-ins after credential theft. Users connecting over public networks should also treat account security and a trusted VPN as basic hygiene, though email and identity defenses remain the primary control here.

Share:

// SOURCES

// RELATED

Three Microsoft Defender zero-days actively exploited; two still unpatched

Security firm Huntress warns of active exploitation of three Microsoft Defender zero-days, codenamed BlueHammer, RedSun, and UnDefend. Two remain unpa

6 min readApr 18

London healthcare faces months of disruption after ransomware attack on key supplier

A major ransomware attack on pathology provider Synnovis has caused severe, ongoing disruption to London hospitals, highlighting critical supply chain

6 min readApr 18

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17