Spycloud analysis shows that 94% of Fortune 50 companies have been exposed to employees in data fishing attacks

Austin, USA/Texas, 7th May 2025/Cybernewswire/-
Data fishing attacks have grown extensively and sophisticated, and Spycloud's research shows that cybercriminals are increasingly aimed at high -value identity data that can be used for the following attacks such as ransomware, accounting and fraud.
Although data only reflects an overview of the data of the data fishing hazard, it provides valuable information to organizations who want to strengthen defense mechanisms, improve user learning and prevent identity -based attacks.
The main findings of the Spycloud Pheed analysis include the following:
- 94% of Fortune 50 companies have been exposed to employee identity data as a result of data fishing attacks.
- 81% of these records include email addresses, 42% includes IP addresses, and 31% includes detecting the details of the device and browser information.
- The largest industries in data fishing campaigns include: telecommunications, IT and financial services.
- Two -thirds of the 5.5 million documents included mandate, financial information or visitor metadata, while 37% came from E -Post target lists (a set of addresses selected for data fishing fishing fishing fishing fishing fishing fishing
“Not only does the data fishing threats grow – they evolve. In the last six months, we have seen that the number of data fishing emails is 17%. Particularly concern is that nearly 82% of the victims were endangered by E -mail mandates in earlier data offenses, giving attackers a critical advantage,” said Brian Jack.
“This emphasizes the urgent need for continuous security training, but it is only half of the equation. Security teams must also have their specific exposure to the visibility so that they can heal fast, purposeful measures. Connecting human vigilance to the intelligence is the most effective way to stop phacency in their traces – and prevent it from opening it.
Data fishing attacks are on the rise because organizations do not have defense mechanisms, but because cybercriminals modernize their tactics by developing data fishing campaigns for industrial operations as data fishing as a service (Phas) platforms and AI.
With the ability to automate the creation of complex data fishing kits, threateners can more easily collect mandates and 2FA codes, distribute data fishing links through QR codes, and bypassing captains to identify.
“In order to combat the extent of growth and the complexity of data fishing attacks, security teams require access to real -time identity data before this leads to a wider compromise,” said Trevor Hilligoss, Spycloud Security Research.
“One area where organizations that do not have an overview is the target lists, mature with victims of potential data fishing campaign.
Hilligoss continues: “If organizations improve the Phided Vontndonta, end endangered web sessions and act on other stolen identity artefacts, they significantly reduce their risk – and disturb the attackers' ability to escalate privileges and trigger ransomware.”
Spycloud dives deeper into these findings during its upcoming webinar on Thursday, May 15th, Phish will happen: what reversed data will be revealed about the industrialization of data fishing. Organizations interested in identifying and disturbing the identity of data fishing before their expansion
About Spycloud
Spycloud data on violations, malware -infected devices, and successful Phishis also provide many popular dark web monitoring and provision of identity thefts. Customers include seven Fortune 10 with hundreds of global companies, medium-sized businesses and government agencies around the world.
Spycloud, a TX in Austin, has more than 200 cyber security experts, whose mission is to protect companies and consumers from stolen identity data that criminals are currently using to target them.
For more information and knowledge of the users' business exposed data, users can visit
Contact
Brown
Emily
On behalf of Req Spycloud
[email protected]This story was published by Cybernewr