THREAT INTELLIGENCE BRIEF _

Phishing is Still the
Number One Threat
to Your Business.

The government's own data is clear: 88% of breached businesses traced their incident back to a phishing email. That is not a technology problem. It is a people problem, a process problem, and a board-level responsibility. This briefing breaks down what the attacks look like, how they work, and what you can do about them this quarter.

0 BUSINESSES
BREACHED LAST YEAR
0% OF THOSE BREACHES
WERE PHISHING
0% HAVE NO FORMAL
INCIDENT RESPONSE PLAN
SCROLL TO BRIEF
01 // GOVERNMENT SIGNAL DATA

The Numbers Straight From Government

The Cyber Security Breaches Survey 2025/2026, published by the Department for Science, Innovation and Technology, surveyed 2,112 businesses. These are the findings that should be keeping business owners up at night.

PREVALENCE

43% of businesses were hit

That is approximately 612,000 businesses reporting at least one cyber breach or attack in the last twelve months. The number has held flat since last year, which means the problem is not getting better. It is becoming background noise.

DOMINANT VECTOR

88% of breaches involved phishing

Among those who were breached, phishing was the attack method in 88% of cases. 51% experienced phishing and nothing else. This is not one of many threats. It is functionally the only threat most businesses will ever face.

CONSEQUENCES WORSENING

Revenue loss jumped from 2% to 5%

For those who got hit properly, the outcomes are meaner than last year. Revenue loss jumped, reputational damage tripled from 1% to 3%, and micro-businesses recovering within a day fell from 92% to 86%. The tail is uglier.

CONTROLS GAP

75% have no incident response plan

Only 25% of businesses have a formal incident response plan. Only 34% patch critical vulnerabilities within 14 days. Only 47% have two-factor authentication. The basics are not in place for the majority.

Source: UK Cyber Security Breaches Survey 2025/2026, Department for Science, Innovation and Technology and Home Office. Published 30 April 2026 under Open Government Licence v3.0. Fieldwork conducted August to December 2025 across 2,112 businesses.
0k

BUSINESSES HIT
IN 12 MONTHS

0.19m

TOTAL CYBER CRIMES
AGAINST BUSINESSES

0%

HAVE 2FA
DEPLOYED

0%

HOLD CYBER
ESSENTIALS

02 // THREAT ANATOMY

How a Phishing Attack Unfolds

Modern phishing campaigns are not random spam blasts. They are structured operations with defined stages, each exploiting a different weakness. Each stage is also a point where the right control can stop them dead.

CLICK EACH STAGE TO EXPAND ATTACKER vs DEFENDER DETAIL

STAGE 01
RECON
STAGE 02
DELIVERY
STAGE 03
HARVEST
STAGE 04
EXECUTE
STAGE 05
SPREAD
03 // THREAT DETECTION

Anatomy of a Phishing Email

Attackers invest real effort into crafting emails that look legitimate. Knowing the indicators, both visible and hidden in email headers, is the first line of human-layer defence.

DOMAIN SPOOFING URGENCY TRIGGER GENERIC GREETING OBFUSCATED URL FEAR-BASED CTA
## Return-Path mismatch confirms spoofing Return-Path: bounces@m1crosoft-verify.com From: Microsoft Security <security@microsoft.com> ## All three authentication protocols failing Authentication-Results: mx.google.com; spf=fail dkim=fail dmarc=fail (p=NONE) ## Routed through suspicious infrastructure Received: from mail.bullethost-ru.net (45.91.209.17) ## Safe URL extraction for analysis $ cat phishing.eml | grep -Eo "(http|https)://[a-zA-Z0-9./?=_%:-]*" $ curl -I https://m1crosoft-verify.com # check redirects
Critical: A mismatch between Return-Path and From headers combined with SPF/DKIM/DMARC failures would be blocked by a properly configured gateway. But only if those records exist. Only 29% of businesses have DMARC set to reject.
NETWORK IOC

URL Obfuscation Tactics

  • Homoglyph substitution (m1crosoft vs microsoft)
  • Subdomain abuse (login.evil.com/microsoft)
  • URL shorteners masking final destination
  • Suspicious TLDs (.tk, .ml, .ga, .xyz)
  • IP addresses instead of domain names
ENDPOINT IOC

Malicious Attachment Markers

  • Macro-enabled Office documents (.xlsm, .docm)
  • Password-protected archives bypassing AV
  • Double file extensions (invoice.pdf.exe)
  • ISO/IMG files bypassing Mark-of-Web
  • LNK files launching hidden PowerShell
04 // MYTH-BUSTER

"We're Too Small to Be a Target"

This is the single most dangerous sentence in business cybersecurity. It is not just wrong. It is precisely what attackers are counting on you to believe. Here is why.

"Nobody would bother attacking a business our size."

Attackers do not browse a directory and hand-pick targets. Modern phishing campaigns are automated, industrialised operations. They scrape thousands of email addresses from public sources, breached databases, and Companies House filings, then blast lures at scale. Your business does not need to be interesting. It just needs to exist and have an email address.

42%
OF MICRO-BUSINESSES (1-9 STAFF)
WERE HIT IN THE LAST 12 MONTHS
SOURCE: DSIT CYBER BREACHES SURVEY 2025/26

That is not a rounding error. Nearly half of the smallest businesses in the country experienced some form of breach or attack. The survey explicitly notes that this is likely an undercount, because many attacks go undetected entirely.

"We don't have any data worth stealing."

Every business holds data that has direct monetary value on criminal marketplaces. Customer email addresses, payment card details, staff national insurance numbers, supplier banking information, login credentials. Even a small customer database of 200 records has resale value. An email account with access to invoice workflows is worth more than a stolen credit card, because it enables business email compromise fraud worth thousands per transaction.

14%
OF BUSINESSES ADMITTED HOLDING
PERSONAL DATA WITHOUT ENCRYPTION
OR ANONYMISATION
"Attackers only go after the big companies."

Small businesses are routinely used as staging grounds for attacks against larger targets. If your business has a single email integration, shared drive, or VPN connection with a larger client, you are a door into their network. Only 15% of businesses review the cyber risk posed by their immediate suppliers. Only 6% look at the wider supply chain. Attackers know this and exploit the weakest link.

Beyond supply chain attacks, compromised small business infrastructure gets conscripted into botnets. Your office router, NAS drive, or unpatched server becomes a zombie device, used to relay spam, launch denial-of-service attacks, or host phishing pages that target other victims. You may never know it happened, and your IP address ends up on blocklists, damaging your email deliverability and business reputation.

6%
OF BUSINESSES REVIEW THEIR
WIDER SUPPLY CHAIN FOR
CYBER SECURITY RISK
"If we haven't been hit yet, we're probably fine."

Credential breaches are cumulative. When a major platform gets compromised, millions of email and password combinations end up in publicly traded databases. If any of your staff reuse passwords (and statistically, most do), those credentials are already circulating. Attackers run credential stuffing attacks against business email portals, accounting software, and cloud platforms using these leaked pairs. You do not need to be directly attacked. You are caught in the splash damage of someone else's breach.

The survey found that 19% of businesses were victims of at least one cyber crime, and the mean number of cyber crimes per victim was 19. That is not a one-and-done event. It is sustained, repeated targeting.

5.19m
ESTIMATED TOTAL CYBER CRIMES
AGAINST BUSINESSES IN 12 MONTHS
MANY FROM AUTOMATED SPLASH ATTACKS
05 // DEFENSIVE CONTROLS

Five Layers of Phishing Defence

No single control stops phishing. Effective protection requires defence in depth, layering technical controls, process, and people-led awareness into a coherent, measurable programme.

SPF, DKIM and DMARC: The Baseline Most Businesses Still Haven't Deployed

These three DNS-based protocols are the foundation of email authentication. Without them, anyone can send email that appears to come from your domain. DMARC at reject policy prevents the vast majority of spoofed email from reaching your staff.

The government survey shows only 47% of businesses have two-factor authentication and only 5% hold Cyber Essentials certification. Email authentication deployment is even lower across the broader business population.

## SPF: Authorise your mail senders TXT yourdomain.co.uk "v=spf1 include:spf.protection.outlook.com -all" ## DKIM: Cryptographic signature validation TXT default._domainkey.yourdomain.co.uk "v=DKIM1; k=rsa; p=[PUBLIC_KEY]" ## DMARC: Policy enforcement + reporting TXT _dmarc.yourdomain.co.uk "v=DMARC1; p=reject; rua=mailto:dmarc@yourdomain.co.uk"

// ADOPTION RATES ACROSS THE BUSINESS POPULATION

SPF
68%have SPF configured
DKIM
44%have DKIM configured
DMARC
29%have DMARC at reject

Controlled Phishing Simulations

The most effective way to reduce human-layer risk is to put your staff through realistic, controlled phishing simulations before real attackers do. Frameworks like Gophish allow security teams to craft and deploy campaigns that mirror real-world tactics, track click rates, and trigger immediate contextual training for those who fall victim.

The government data shows only 19% of businesses ran any kind of staff training or awareness activity. Click-through rates above 10% indicate a high-risk workforce. Businesses running quarterly simulations typically see a 60-70% reduction within 12 months.

313SEC Standard: All simulations are conducted under signed Rules of Engagement, in isolated environments, with full leadership awareness. Ethical, authorised, and legally sound.

What a Simulation Engagement Covers

  • Scope and rules of engagement, defining targets, timelines, constraints
  • Campaign design with sector-relevant lures (invoice fraud, IT helpdesk, HMRC)
  • Infrastructure setup with clean sending domains and tracking pixels
  • Phased campaign execution to avoid detection patterns
  • Results reporting with click rates, credential submissions, time-to-click
  • Immediate micro-training at the point of failure
  • Executive debrief with risk-rated findings and recommended controls

AI-Powered Detection: Staying Ahead of AI-Crafted Attacks

Generative AI has fundamentally changed the threat landscape. Attackers now produce flawless, personalised phishing emails at scale, sourced from a target's public LinkedIn profile, company website, and social media. Rule-based filters that relied on spelling mistakes and generic templates are becoming obsolete.

Modern defensive models analyse message semantics, sender reputation, URL characteristics, and behavioural signals simultaneously, flagging suspicious emails before they reach an inbox. Credential phishing now accounts for 94% of all payload-based email attacks globally.

The government survey found 31% of businesses are using or considering AI, but only 24% of those have any cyber processes for managing AI risk. Adoption is outrunning governance.

Detection Signal Extraction

# Phishing URL feature extraction def extract_features(url): return [ len(url), # length 1 if '@' in url else 0, # @ abuse url.count('.'), # subdomains has_ip(url), # IP as host has_suspicious_tld(url), # .tk/.ml/.ga entropy(url), # randomness age_of_domain(url), # registration ]

ML classifiers trained on threat intelligence datasets achieve 94%+ accuracy on known phishing patterns. 313SEC integrates reputation feeds and real-time URL analysis into managed detection workflows.

Endpoint Controls: Last Line of Defence

When a user clicks, endpoint controls are your final barrier. Attack Surface Reduction rules, PowerShell logging, and network protection policies stop payloads from executing even after a successful phishing click.

## Enable PowerShell Script Block Logging Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\ Microsoft\Windows\PowerShell\ScriptBlockLogging" -Name "EnableScriptBlockLogging" -Value 1 ## Enable Network Protection Set-MpPreference -EnableNetworkProtection Enabled ## Block Office macro child processes (ASR) Add-MpPreference -AttackSurfaceReductionRules_Ids \ D4F940AB-401B-4EFC-AADC-AD5F3C50688A \ -AttackSurfaceReductionRules_Actions Enabled

Endpoint Hardening Checklist

  • Macro execution disabled by default across all Office applications
  • PowerShell logging and constrained language mode enabled
  • SmartScreen enforced via group policy
  • ASR rules deployed in block mode
  • EDR agent with behavioural detection active
  • MFA enforced across all cloud identity providers
  • Conditional access policies for unmanaged devices

When the Click Happens: Your First 72 Hours

Response speed is the single greatest determinant of breach cost. Under UK GDPR, personal data breaches must be reported to the ICO within 72 hours. The decisions made in that window define the outcome.

T+00:00 // DETECTION
User reports suspicious email or click
Isolate the affected device. Do not power off as volatile memory may contain attacker artefacts. Notify your security lead.
T+01:00 // CONTAINMENT
Credential reset and network segmentation
Revoke and rotate any credentials entered on the phishing page. Block the malicious domain at DNS and proxy level. Audit active sessions.
T+04:00 // INVESTIGATION
Forensic triage and scope assessment
Analyse email headers, endpoint telemetry, and proxy logs to determine blast radius. Identify lateral movement indicators. Preserve forensic evidence.
T+24:00 // NOTIFICATION
ICO and stakeholder notification
Under UK GDPR, personal data breaches must be reported to the ICO within 72 hours. 313SEC can assist with notification drafting and evidence preparation.
T+72:00 // RECOVERY
Remediation and control uplift
Restore from clean backups. Implement control gaps. Post-incident review. Update your phishing simulation programme based on lessons learned.
06 // EXPOSURE ASSESSMENT

Where Businesses Are Most Exposed

Based on the government survey data and our own assessment work, these are the control areas with the highest risk scores and the greatest opportunity for rapid improvement.

Email Authentication (No DMARC reject policy)CRITICAL / 91%
Staff Awareness (No formal training programme)HIGH / 81%
Incident Response (No documented playbook)HIGH / 75%
Patch Management (No 14-day policy)HIGH / 66%
MFA Coverage (Incomplete or absent)MEDIUM / 53%
Supply Chain Review (No supplier assessment)MEDIUM / 85%
GHOSTLINE MANAGED SECURITY // CARDIFF, WALES

Stop Being a Statistic.

313SEC delivers phishing simulation programmes, email authentication configuration, and ongoing managed detection built specifically for businesses who need enterprise-grade protection without enterprise overhead.

REQUEST A PHISHING ASSESSMENT EXPLORE 313SEC

Open a Channel.

If anything in this briefing made you tilt your head, drop your details below. No sales script, no auto-sequence. Just a real reply from a real person within a working day or two.

Submission via Formspree. Replies from a human. Your data is not added to any list.

Transmission Received.

You'll get a real reply, from a real person, within a couple of working days. Cheers for reading.