Back in April I gave you the results of a quarterly study by KnowBe4 that looks into which phishing subject lines staff are most vulnerable to. They looked at both simulated phishing messages sent as part of their security awareness training, and real world “in the wild” phishing messages reported to them by users. They just released the results of their 3rd quarter study and found that employees are still most vulnerable to messages with internal business-related subject lines.
The most clicked-on subject lines from global phishing tests
Messages with subject lines related to internal business – particularly those that look like they’re coming from HR – continue to have success. This is because they appear to be something that could affect a user’s actual workload and routine. Often, these messages also convey a sense of urgency, a common ploy used by hackers to get the user to act quickly, without thinking. Here are the top 5 subject lines that users clicked on:
- From Google: You were mentioned in a document: “Strategic Plan Draft”
- From HR: Dress Code Changes
- From HR: Vacation Policy Update
- From Adobe Sign: Your Performance Review
- Password Check Required Immediately
The most reported subject lines found “in the wild”
KnowBe4 also tallied up the actual (not simulated) phishing messages reported to them via their “Phishing Alert” button by users:
- Equipment and Software Update
- Mail Notification; You have 5 Encrypted Messages
- Amazon: Amazon – delayed shipping
- Google: Password Expiration Notice
- Action required: Your payment was declined
Top 5 attack vectors
Attack vectors are the techniques used by the sender to try to engage and ensnare users. These were the top methods used in the phishing messages reported to KnowBe4:
- Click here: There is a phishing hyperlink in the body of the message
- Domain spoofing: The message appears to come from the user’s domain
- Open this attachment: The message includes a PDF attachment
- Branding: The user’s organizational logo and name are in the message
- Credentials landing page: A link in the message takes the user to a new landing page where they are asked to log in or enter some other data.
You can see/download the full infographic here.