61% of Successful Phishing Attacks Against Government Organizations Result in Full Compromise of Credentials

phishing attack government organizationsPhishing remains the top primary attack vector that keeps on giving to cybercriminals, as new data highlights the victories cybercriminals are enjoying at your organization’s expense.

The old adage “if it works, work it” seems to be applicable to phishing scams targeting credentials. Cybercriminals have long been looking for a way to easily monetize phishing attacks – and they seem to have found the holy grail in the form of obtaining victim credentials to online services.

And so, they continue to “work it” – using phishing attack after phishing attack to steal credentials to assist in either network infiltration, business email compromise, a ransomware attack, or data theft.

According to new data from Coalfire’s 3rd Annual Penetration Risk Report shows phishing also is the top attack vector leading to the compromise of government organizations subject to FedRAMP compliance. According to the report, a lack of training against social engineering tactics used in phishing also tops the list of vulnerabilities in these organizations.

The combination of these two pieces of information points directly at an inability for users to determine when email is malicious in intent, and that the malicious outcomes of such attacks are significant in nature.

Organizations subject to FedRAMP are required to perform phishing testing, which is only useful as a feedback loop within a Security Awareness Training initiative, where additional training can be assigned to those that fail the phishing tests.

Phishing attacks are at their historical peak in effectiveness and there’s no indication that this is going to change. It’s time to provide your users with tools in the form of new school Security Awareness Training to prepare them for when the next phishing attack occurs.

Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:


Subscribe To Our Blog

New call-to-action

Get the latest about social engineering

Subscribe to CyberheistNews