Computer Support, Design, Print and Business Telecoms - ABC Service, Tavistock, Devon

Alarming Phishing Attack Trends to beware of in 2022

May 9, 2022

In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business's health and wellbeing because it’s the main delivery method for all types of cyberattacks.

One phishing email can be responsible for a company succumbing to ransomware and having to face costly downtime. It can also lead a user to unknowingly hand over the credentials to a company email account that the hacker then uses to send targeted attacks to customers.

Phishing takes advantage of human error, and some phishing emails use sophisticated tactics to fool the recipient into divulging information or infecting a network with malware.

Mobile phishing threats skyrocketed by 161% in 2021.

Your best safeguards against the continuous onslaught of phishing include:

  • Email filtering
  • DNS filtering
  • Next-gen antivirus/anti-malware
  • Ongoing employee cybersecurity awareness training

To properly train your employees and ensure your IT security is being upgraded to meet the newest threats you need to know what new phishing dangers are headed your way.

Here are some of the latest phishing trends that you need to watch out for in 2022.

 

PHISHING IS INCREASINGLY BEING SENT VIA TEXT MESSAGE

Fewer people are suspicious of text messages than they are of unexpected email messages. Most phishing training is usually focused on the email form of phishing because it’s always been the most prevalent.

But cybercrime entities are now taking advantage of the easy availability of mobile phone numbers and using text messaging to deploy phishing attacks. This type of phishing (called “smishing”) is growing in volume.

People are receiving more text messages now than they did in the past, due in large part to retailers and service businesses pushing their text updates for sales and delivery notices.

This makes it even easier for phishing via SMS to fake a shipment notice and gets a user to click on a shortened URL.

 

BUSINESS EMAIL COMPROMISE IS ON THE RISE

Ransomware has been a growing threat over the last few years largely because it’s been a big money-maker for the criminal groups that launch cyberattacks. A new up-and-coming form of attack is beginning to be quite lucrative and thus is also growing.

Business email compromise (BEC) is on the rise and being exploited by attackers to make money off things like gift card scams and fake wire transfer requests.

What makes BEC so dangerous (and lucrative) is that when a criminal gains access to a business email account, they can send very convincing phishing messages to employees, customers, and vendors of that company. The recipients will immediately trust the familiar email address, making these emails potent weapons for cybercriminals.

 

SMALL BUSINESSES ARE BEING TARGETED MORE FREQUENTLY WITH SPEAR PHISHING

There is no such thing as being too small to be attacked by a hacker. Small businesses are targeted frequently in cyberattacks because they tend to have less IT security than larger companies.

43% of all data breaches target small and mid-sized companies, and 40% of small businesses that become victims of an attack experience at least eight hours of downtime as a result.

Spear phishing is a more dangerous form of phishing because it’s targeted and not generic. It’s the type deployed in an attack using BEC.

It used to be that spear-phishing was used for larger companies because it takes more time to set up a targeted and tailored attack. However, as large criminal groups and state-sponsored hackers make their attacks more efficient, they’re able to more easily target anyone.

A result is small businesses receiving more tailored phishing attacks that are harder for their users to identify as a scam.

 

THE USE OF INITIAL ACCESS BROKERS TO MAKE ATTACKS MORE EFFECTIVE

We just discussed the fact that large criminal groups are continually optimizing their attacks to make them more effective. They treat cyberattacks like a business and work to make them more profitable all the time.

One way they are doing this is by using outside specialists called Initial Access Brokers. This is a specific type of hacker that only focuses on getting the initial breach into a network or company account.

The increasing use of these experts in their field makes phishing attacks even more dangerous and difficult for users to detect.

 

BUSINESS IMPERSONATION IS BEING USED MORE OFTEN

As users have gotten savvier about being careful of emails from unknown senders, phishing attackers have increasingly used business impersonation. This is where a phishing email will come in looking like a legitimate email from a company that the user may know or even do business with.

Amazon is a common target of business impersonation, but it also happens with smaller companies as well. For example, there have been instances where website hosting companies have had client lists breached and those companies sent emails impersonating the hosting company and asking the users to log in to an account to fix an urgent problem.

More business impersonation being used in phishing attacks mean users have to be suspicious of all emails, not just those from unknown senders.

 

IS YOUR COMPANY ADEQUATELY PROTECTED FROM PHISHING ATTACKS?

It’s important to use a multi-layered strategy when it comes to defending against one of the biggest dangers to your business's wellbeing. Get started with a cybersecurity audit to review your current security posture and identify ways to improve by contacting us at ABC Service in Tavistock, Devon.

The article is used with permission from The Technology Press.

OLDER POSTS

Does Eco-Friendly Printing Really Matter in 2026? Here’s the Green Truth

In 2026, the conversation around sustainability has shifted from a “nice-to-have” marketing buzzword to a fundamental pillar of business operations. For small to medium-sized businesses across the UK, the pressure to demonstrate environmental...

Is Your PC Due an MOT? Why Regular Servicing Saves You a Headache (and Money!)

Most of us wouldn’t dream of driving our cars for years on end without a single service or an MOT. We know that skipping that yearly check-up is a recipe for a breakdown at the most inconvenient moment possible, usually on a rainy Tuesday morning when you’re already...

Beyond the Screen: The Most Exciting Tech Breakthroughs of April 2026

It is a fantastic time to be involved in the world of technology. As we settle into April 2026, the pace of innovation isn’t just moving; it’s accelerating. Here at ABC Service, we spend a lot of our time ensuring your office Wi-Fi is snappy and your laptops are...

Beyond ‘Turn it Off and On Again’: The New Rules of Managed IT

Good IT support should do more than swoop in after something has already gone bang. For growing businesses, reactive fixes are only part of the job. The real value comes from preventing issues, improving performance, tightening security, and making sure your systems...

Email Security: Why DMARC, SPF, and DKIM Are No Longer Optional

Have you ever sent an important invoice or a time-sensitive quote to a client, only to have them tell you three days later that they “never received it”? You check your sent folder, and everything looks fine. You didn’t get a bounce-back. So, where did it...

The Dead Internet Theory: Are We Alone in the Digital Void?

Welcome to the very first edition of Tuesday Intrigue! Here at ABC Service, we spend our days fixing computers, designing stunning graphics, and ensuring your business stays connected. But as we look at the digital landscape in 2026, we’ve noticed things are getting a...

Why High-Performance Web Hosting Will Change the Way Your UK Small Business Ranks

Have you ever clicked on a link, waited three seconds for the page to load, and then immediately hit the ‘back’ button? We’ve all been there. In the fast-paced digital world of 2026, those three seconds feel like an eternity. For a small business, those...

The Dressmaker’s Guide to Stress-Free Sewing: Why Professional Pattern Printing Wins

If you have ever spent an entire evening on your living room floor, armed with a roll of Sellotape and a pair of paper scissors, painstakingly joining thirty sheets of A4 paper together, you know the “joy” of digital sewing patterns. We call it...

Tired of Being On Hold? Why a Local IT Partner Beats National Call Centres in Devon

We’ve all been there. You’re in the middle of a busy Tuesday morning in Tavistock, your internet has decided to take an unscheduled holiday, and your printer is making a sound like a tractor in distress. You call your national IT provider, only to be met with twenty...

Memory Lane is Getting Expensive: Why RAM Prices are Climbing in 2026

If you’ve popped into our Tavistock office lately or been browsing for a new laptop online, you might have noticed something a bit unsettling. The prices aren’t just creeping up; they’re leaping. Specifically, the cost of “Memory” or RAM (Random...