191,561

phishing/spoofing complaints reported to FBI IC3 in 2025.

$20.87B

total reported IC3 losses across cyber-enabled crime in 2025.

1.13M

phishing attacks observed by APWG in Q2 2025.

28%

of Microsoft-observed breaches began through phishing or social engineering.

Phishing facts & statistics

Search phishing facts & stats.

Each stat includes context so it is not just a number on a page. Use the filters to compare email phishing, mobile phishing, human behavior, and financial impact.

Source Why it matters Copy / Share
191,561 Phishing/spoofing was the most reported IC3 crime type in 2025. Email Phishing Stats 2025 FBI IC3 2025 Internet Crime Report This volume shows how often phishing and spoofing reach real victims. For businesses, it reinforces that email and impersonation defenses need constant testing, not one-time reminders.
$215.8M Reported phishing/spoofing losses reached $215.8 million in 2025. Financial Impact Stats 2025 FBI IC3 2025 Internet Crime Report Losses tied directly to phishing and spoofing are only the reported portion. The operational damage, downtime, and follow-on fraud can be much larger for affected teams.
24,768 Business Email Compromise generated 24,768 IC3 complaints in 2025. Financial Impact Stats 2025 FBI IC3 2025 Internet Crime Report BEC attacks often start with trust: a vendor, executive, or internal finance request. Training should help employees pause, verify, and report suspicious payment workflows.
$3.05B Business Email Compromise losses exceeded $3.0 billion in 2025. Financial Impact Stats 2025 FBI IC3 2025 Internet Crime Report BEC is financially severe because attackers target payment authority and timing. Finance, payroll, and executive assistants should be priority audiences for scenario-based phishing tests.
22,364 IC3 recorded 22,364 AI-related complaint descriptors in 2025. Human Risk / User Behavior Stats 2025 FBI IC3 2025 Internet Crime Report AI makes scams faster to create and easier to personalize. Employees need examples of AI-assisted phishing, voice impersonation, and fake login workflows before they see them in the wild.
$893.3M AI-related IC3 complaint descriptors represented $893.3 million in reported losses. Financial Impact Stats 2025 FBI IC3 2025 Internet Crime Report AI is not just a novelty in security awareness. It is already connected to measurable financial harm, which means prevention programs should address deepfakes, synthetic messages, and automated lures.
1,130,393 APWG observed 1,130,393 phishing attacks in Q2 2025. Email Phishing Stats 2025 APWG Phishing Activity Trends Report Q2 2025 A quarterly total over one million shows phishing is not seasonal noise. Teams should plan recurring simulations and refreshed content because attacker volume remains high.
853,244 APWG observed 853,244 phishing attacks in Q4 2025. Email Phishing Stats 2025 APWG Phishing Activity Trends Report Q4 2025 Even after a quarter-over-quarter dip, APWG still recorded hundreds of thousands of attacks. Defense programs should look at long-term exposure rather than one quiet month.
1,642 APWG reported that 1,642 brands were targeted by QR-code phishing in Q2 2025. Smishing / Mobile Phishing Stats 2025 APWG Phishing Activity Trends Report Q2 2025 QR phishing moves the attack from a monitored workstation to a personal mobile device. Employees should be trained to inspect the destination before scanning or entering credentials.
$83,099 The average requested wire transfer in Q2 2025 BEC attacks was $83,099. Financial Impact Stats 2025 APWG Phishing Activity Trends Report Q2 2025 BEC attackers aim for high-value transfers. A single missed verification step can create a loss large enough to justify ongoing training, reporting, and payment approval controls.
28% Microsoft reported that 28% of breaches began through phishing or social engineering. Human Risk / User Behavior Stats 2025 Microsoft Digital Defense Report 2025 This keeps people at the center of breach prevention. Technical controls matter, but users still need simple ways to recognize, report, and recover from social engineering.
3x Microsoft reported AI-driven phishing is three times more effective than traditional campaigns. Human Risk / User Behavior Stats 2025 Microsoft Digital Defense Report 2025 AI removes many of the old clues employees learned to spot, such as awkward grammar. Training should focus more on context, verification, and reporting behavior.
44% Ransomware was present in 44% of breaches in the 2025 DBIR. Financial Impact Stats 2025 Verizon 2025 Data Breach Investigations Report Ransomware is often the visible business disruption after earlier access succeeds. Phishing prevention reduces one common path that leads to extortion and operational downtime.
22% Credential abuse accounted for 22% of leading initial attack vectors in the 2025 DBIR. Human Risk / User Behavior Stats 2025 Verizon 2025 Data Breach Investigations Report Phishing often becomes credential theft before it becomes a breach. Password managers, phishing-resistant MFA, and login-page awareness help limit the blast radius.
30% Third-party involvement doubled to 30% of breaches in the 2025 DBIR. Financial Impact Stats 2025 Verizon 2025 Data Breach Investigations Report Vendor and partner compromise can make phishing look familiar. Employees should verify unexpected requests even when the sender appears connected to a real business relationship.
<60 sec Verizon reported the median time for users to fall for phishing emails was less than 60 seconds. Human Risk / User Behavior Stats 2024 Verizon 2024 Data Breach Investigations Report Speed is the attacker advantage. Training should make reporting quick and obvious so users do not have to slow down a busy workday to do the right thing.
68% The 2024 DBIR reported that 68% of breaches involved a human element. Human Risk / User Behavior Stats 2024 Verizon 2024 Data Breach Investigations Report Human involvement does not mean blame. It means security teams need measurable behavior, useful coaching, and clear reporting channels.
No matching phishing facts or statistics found. Try a broader search or choose all categories.

Current statistics stay visible first, and six older archive stats are also shown by default. Year search still works, and you can load the rest when you want broader historical context.

What is phishing?

Phishing turns trust into an attack path.

Phishing is a social engineering attack that tricks people into clicking a link, opening an attachment, scanning a QR code, approving a login, or sharing credentials. It often looks like normal work: a password reset, payment request, document share, delivery notice, or executive message.

The numbers below are useful because they connect phishing to the outcomes leadership cares about: credential abuse, financial fraud, ransomware, response time, and measurable human risk.

Why it is increasing

Attackers move faster now.

Phishing trends

AI and mobile are changing phishing.

Modern phishing does not always look sloppy. Attackers can use AI to write believable messages, abuse legitimate services, hide links behind QR codes, and shift conversations to SMS or voice channels.

That means training needs to focus on behavior: checking context, verifying requests out of band, and reporting fast.

Business impact

Costs go beyond the first click.

One phishing email can create credential theft, unauthorized payment activity, vendor compromise, ransomware exposure, and response costs. The stat table separates direct reported losses from breach and behavior indicators so teams can tell a clearer story.

Use this data when building awareness goals, executive reporting, and budget requests for prevention.

Internal links

Useful next steps

How to prevent phishing

Layer defenses around people.

Phishing prevention works best when people, process, and technology reinforce each other. These controls keep the page practical instead of just alarming.

Use phishing-resistant MFA

Strong authentication reduces damage when credentials are stolen and makes fake login pages less effective.

Test with realistic simulations

Simulations help teams practice safely, measure risk, and find departments that need extra coaching.

Make reporting easy

A clear report button turns employees into sensors and gives security teams faster visibility.

Verify sensitive requests

Payment changes, password resets, and vendor requests should have out-of-band verification steps.

FAQ

Common phishing statistics questions.

Short answers for leaders, security teams, and awareness program owners who need to explain why phishing remains a priority.

How common is phishing?
Phishing remains one of the most commonly reported cyber-enabled crime types. In the FBI IC3 2025 report, phishing/spoofing was the top crime type by complaint count, and APWG continued to observe hundreds of thousands of phishing attacks each quarter.
Why are phishing attacks increasing?
Phishing is inexpensive to launch, easy to personalize, and now easier to scale with AI. Attackers also reuse trusted brands, QR codes, text messages, and compromised accounts to make fraudulent requests feel routine.
What phishing statistics matter most to a business?
Focus on metrics tied to business exposure: phishing reports, credential theft, BEC losses, ransomware presence, user reporting speed, and repeat-risk groups. Those numbers help security teams decide where training and simulations should go next.
How can organizations reduce phishing risk?
Use layered defenses: phishing-resistant MFA, strong email authentication, recurring phishing simulations, short training moments, reporting buttons, and a process for verifying payment or credential requests before action is taken.
Should older phishing statistics stay on the page?
Yes, but older stats should be secondary. Keep the main table focused on recent data and let visitors load older statistics only when they want historical context.