Email Hacking Statistics: AI Phishing, Quishing, Deepfakes, Breach Trends

Written by Clean Email Team

Email accounts have become one of the main entry points for data breaches, phishing attacks, credential theft, and account takeover - and AI is making these attacks harder to spot. This report brings together the latest email hacking statistics, email phishing statistics, and email security breach data to show how often emails are hacked, how compromised credentials spread, and how phishing attack trends may evolve through 2030.

1. Research Scope: Email Account Compromise, Breaches, and Phishing Trends

This report is built on the latest available 2026 data drawn from the most trusted and reputable sources in the global cybersecurity landscape — including the Verizon Data Breach Investigations Report (DBIR), Microsoft Digital Defense Report, Proofpoint State of the Phish, FBI Internet Crime Complaint Center (IC3), SpyCloud Annual Identity Exposure Report, Anti-Phishing Working Group (APWG), ENISA Threat Landscape, Abnormal AI, Kasada, eSentire, SpyCloud, Cloudflare, Surfshark, Have I Been Pwned, Keepnet Labs, and Hoxhunt, among others.

It goes measurably deeper than standard breach and phishing benchmark reports by combining raw statistics, cross-source validation, credential-exposure analysis, email-account risk interpretation, and phishing-trend segmentation. Where individual vendor reports provide isolated data points, this report synthesizes and triangulates across sources to surface patterns that no single dataset can reveal in isolation.

This report includes a unique forward-looking forecast for 2026–2030 based on historical breach indicators, phishing activity trends, credential exposure patterns, AI-enabled attack evolution, and scenario analysis. The forecasts presented are not guesses, but modeled projections with clearly stated assumptions, explicit scenario boundaries, and transparent acknowledgment of limitations. They are grounded in multi-year trajectory data and expert indicators, and they distinguish between evidence-based projections and original reasoned estimates.

The report contains extensive original visuals — including charts mapping email-related breach and credential exposure trends, phishing volume trajectories, the quishing (QR-code phishing) surge, account compromise growth curves, BEC loss trends, an email compromise flow diagram, and a 2030 scenario forecast table — designed to make complex email security data immediately comprehensible for security professionals, analysts, content marketers, and technical researchers alike.

All insights are grounded in verifiable, cited data sources, with full transparency around methodology, source quality, and data gaps. Where exact 2026 data has not yet been published, the most current available data is used, clearly labeled with its vintage year and source.

Report scope: This report focuses exclusively on email-related security exposure: how email addresses, email credentials, email accounts, and email-based attacks are involved in data breaches, account compromise, phishing campaigns, credential stuffing, and identity theft. Non-email cybersecurity data is included only where it directly explains how email accounts or email credentials are compromised.

2. Executive Summary

The email credential threat landscape has entered a new phase of scale and sophistication. The following findings represent the most critical cross-validated insights from 2024–2026 data.

Credential and breach exposure:

Phishing attack volume:

AI-generated phishing:

QR-code phishing (quishing):

Account takeover:

Business email compromise:

3. Key Statistics Table: Email Breach, Credential & Phishing Data (2024–2026)

Statistic
Value Year Source Metric Type
Unique email addresses in breach databases (since 2004)
~7.9 billion 2025 Surfshark Exposed email addresses
Email addresses exposed in 2025
500M+ 2025 NordPass/Nord Security Exposed email addresses
Breaches containing email addresses
9 in 10 (90%) 2025 NordPass research Breach composition
ALIEN TXTBASE unique email addresses
2 billion+ Feb 2025 Have I Been Pwned / Troy Hunt Stealer log exposure
Exposed passwords in 2024 (SpyCloud)
3.1 billion 2024 SpyCloud Identity Exposure 2025 Leaked credentials
SpyCloud total identity records
53.3 billion 2024 SpyCloud Identity Exposure 2025 Dark web exposure
Avg. corporate user stolen records
146 records 2024 SpyCloud Identity Exposure 2025 Identity exposure
Avg. consumer: credential pairs
141 pairs across 229 records 2024 SpyCloud Identity Exposure 2025 Identity exposure
Password reuse rate (Cybernews study)
94% of analyzed passwords 2025 Cybernews (19B passwords) User behavior
Users reusing same password after 2+ breaches
74% 2024 SpyCloud Credential reuse
APWG phishing attacks (annual 2024)
4.8 million (record) 2024 APWG Q4 2024 report Phishing volume
APWG phishing attacks Q1 2025
1,003,924 Q1 2025 APWG Q1 2025 report Phishing volume
APWG phishing Q2 2025 (spike)
1,130,393 Q2 2025 APWG / Stingrai Phishing volume
APWG phishing Q4 2025
853,244 Q4 2025 APWG Q4 2025 Phishing volume
Email as breach attack vector (Verizon 2025)
27% of breaches 2025 Verizon DBIR 2025 Breach vector
Credential theft in breaches (Verizon 2025)
22% of breaches 2025 Verizon DBIR 2025 Breach cause
Phishing in breaches (Verizon 2025)
14% of breaches 2025 Verizon DBIR 2025 Breach cause
AI-generated phishing share
82.6% Sep 2024–Feb 2025 Keepnet/VIPRE AI phishing
AI phishing YoY increase
+53.5% 2024→2025 ENISA, Keepnet AI phishing trend
AI phishing click-through rate
54–60% 2025 Securedintel, HBR 2024 Phishing efficacy
Traditional phishing click-through rate
~12% 2024 Securedintel Phishing efficacy
14x surge in AI phishing (month-over-month)
4% → 56% of attacks Dec 2025 Hoxhunt 2026 AI phishing surge
QR-code phishing share of all phishing
12% 2025 Keepnet, Venza Quishing
QR-code phishing growth 2021→2024
0.8% → 12.4% 2021–2025 Keepnet Quishing trend
Quishing fivefold surge H2 2025
46,969 → 249,723/month Aug–Nov 2025 Keepnet / Expression Africa Quishing surge
90% of QR-code attacks = credential phishing
90% 2024–2025 Venza Quishing nature
Deepfakes in BEC (2026)
40% of BEC incidents 2026 Digital Applied Deepfake phishing
ATO increase 2024
+250% year-over-year 2024 Kasada 2025 ATO report Account takeover
ATO increase 2025
+389% year-over-year 2025 eSentire 2026 report Account takeover
US adults experiencing ATO 2024
29% (~77M people) 2024 Security.org via AuthX ATO prevalence
Consumer ATO victims 2025
24% of consumers 2025 Sift Q3 2025 Digital Trust ATO prevalence
Organizations experiencing ATO 2024
74% 2024 SpyCloud ATO – enterprise
BEC losses 2024 (FBI IC3)
$2.77 billion / 21,442 cases 2024 FBI IC3 2024 Annual Report BEC financial impact
Cumulative global BEC losses (since 2015)
$55.5 billion 2015–2024 FBI IC3 BEC financial impact
Phishing-related breach avg. cost (IBM)
$4.76 million 2024 IBM Cost of Data Breach 2024 Financial cost
EvilProxy AiTM attacks per month
66 million 2023–2024 Proofpoint State of Phish 2024 MFA bypass
PhaaS kit share of account compromise
63% of incidents 2025 eSentire 2026 report AiTM phishing
Password-based attacks blocked daily (Microsoft)
7,000/second 2024 Microsoft MDDR 2024 Identity attacks
Organizations targeted for ATO regularly
99% 2024 Proofpoint 2024 Account compromise

4. Methodology and Source Quality Notes

Primary Sources Used

This report draws exclusively on primary-source security reports, government cybercrime data, and peer-reviewed or independently audited research. All statistics are traced to their originating vendor, agency, or dataset rather than secondary blog summaries.

Tier 1 — Government/Regulatory Sources (Highest Authority): FBI IC3 Annual Crime Reports (direct cybercrime complaint data from US law enforcement); ENISA Threat Landscape (European Union incident data, 4,875+ verified incidents in 2025 edition); CISA advisories; FTC consumer reports.

Tier 2 — Independent Multi-Organization Reports: Verizon DBIR (2025 edition: 22,052 incidents across 139 countries); APWG Phishing Activity Trends Reports (direct phishing URL/domain reporting by APWG members); IBM Cost of a Data Breach Report (cross-industry, 604 organizations studied in 2024); Have I Been Pwned breach dataset (Troy Hunt, publicly disclosed breach archive).

Tier 3 — Vendor Research with Disclosed Methodology: SpyCloud Annual Identity Exposure Reports (dark web credential recapture with disclosed methodology); Proofpoint State of the Phish (survey of 7,500 users, 1,050 security professionals across 15 countries + 183M simulated phishing messages); Microsoft Digital Defense Report (78 trillion security signals daily); Cloudflare Threat Reports (global network telemetry); Kasada ATO Trends Report (infiltration of 22 credential stuffing groups); Hoxhunt Phishing Trends (50M+ data points from 4M+ users); eSentire Year in Review (2,000+ customer organizations); Abnormal AI Attack Landscape Report (800,000 email attacks, 4,600+ organizations); Surfshark data breach monitoring tool (20-year dataset); Keepnet Labs QR-code phishing statistics.

Known Limitations

5. Definitions

Term Definition
Email account compromisedAn email account where an unauthorized party has gained access to inbox contents, sent items, or settings — either through credential theft, phishing, AiTM interception, or brute force
Email security breachA data breach event in which email addresses, email credentials, or inbox contents are exposed to unauthorized parties
Exposed email addressAn email address included in a publicly disclosed or dark-web-distributed breach dataset, regardless of whether the corresponding account has been accessed
Leaked email credentialsA pairing of an email address with one or more associated passwords that has appeared in a breach dataset, infostealer log, or dark web marketplace
Credential stuffingAn automated attack that tests leaked email-password combinations across multiple websites and services to identify accounts where the same credentials are reused
Account takeover (ATO)The successful unauthorized access to a user's account — email or otherwise — resulting from compromised credentials, phishing, or session-cookie theft
Phishing emailA malicious email designed to deceive the recipient into revealing credentials, clicking a malicious link, downloading malware, or taking a financially harmful action
AI-generated phishingPhishing emails in which AI language models, generators, or automation tools are used to produce personalized, grammatically correct, contextually aware messages at scale
Quishing (QR-code phishing)Phishing attacks that embed malicious URLs within QR codes included in emails, PDFs, or physical materials, bypassing traditional URL-based email filters
Deepfake-assisted phishingPhishing attacks in which AI-synthesized voice, video, or image content is used to impersonate executives, colleagues, or trusted authorities — typically in the context of BEC or invoice fraud
Business email compromise (BEC)An email-based attack targeting organizations — typically via account impersonation or account takeover — to redirect payments, steal data, or commit fraud

6. Detailed Analysis by Category

6.1 Email Addresses in Data Breaches

Email addresses have emerged as the single most consistently exposed data type in breach datasets. According to NordPass/Nord Security research into database leak trends from 2023 to 2025, nine out of ten breach incidents contain email addresses as an exposed field, making email the most reliably present identifier in stolen data. In 2025 alone, more than 500 million email addresses were exposed across publicly disclosed breach events.

Surfshark's two-decade breach monitoring dataset provides the broadest longitudinal perspective: since 2004, a total of 23.7 billion accounts have been breached globally, with approximately 7.9 billion unique email addresses represented — meaning that the average active email address has been breached approximately three times. On average, each leaked email address is bundled with three additional compromised data points such as passwords, phone numbers, or physical addresses.

The scale of individual breach events continues to grow. The April 2024 National Public Data breach exposed approximately 134 million unique email addresses in its HIBP-indexed data, though the actual scope of the underlying incident was estimated as affecting billions of records. Q1 2024 saw globally leaked accounts surge fivefold from 81 million (Q4 2023) to 435 million, equivalent to 3,353 accounts being leaked every sixty seconds — a 435% increase from Q4 2023 rates.

Key limitation: Exposed email addresses do not equate directly to compromised email accounts. Many breach records contain email addresses used as usernames on third-party services rather than the email accounts themselves.

6.2 Leaked Email Credentials and Password Pairs

The volume of email-password credential pairs circulating in criminal underground markets reached unprecedented scale in 2024–2025. SpyCloud's 2025 Annual Identity Exposure Report documented 3.1 billion exposed passwords recaptured from the darknet in 2024 — a 125% increase from the 1.38 billion recaptured in 2023. The total SpyCloud darknet collection grew 22% year-over-year, reaching 53.3 billion distinct identity records and over 750 billion total stolen assets.

The single largest credential event in recent history was the ALIEN TXTBASE release in February 2025, which contained 23 billion rows of data from stealer logs, including over 2 billion unique email addresses and 1.3 billion unique passwords — 625 million of which had never been seen in prior breach datasets. Troy Hunt (Have I Been Pwned) confirmed this as "the most extensive corpus of data we've ever processed, by a significant margin."

On the consumer side, the average exposed individual now carries 52 usernames and 141 credential pairs spread across 229 distinct exposure records — a profile rich enough to enable impersonation, fraud, and account takeover across multiple platforms. For corporate users, the situation is more severe: the average corporate identity now has 146 stolen records linked to it, a 12x increase from prior estimates, largely driven by the expansion of infostealer malware operations.

6.3 Compromised Email Accounts

Directly measuring the number of compromised email accounts — as distinct from exposed email addresses — is among the most difficult measurements in cybersecurity due to underreporting, delayed detection, and definitional ambiguity. However, multiple proxy indicators confirm the scale.

Proofpoint's 2024 State of the Phish found that 99% of organizations are regularly targeted for account takeovers, and 62% are actually impacted. eSentire's 2026 Threat Landscape Outlook reported a 389% year-over-year rise in account compromise in 2025, with account compromise accounting for 55% of all attacks observed in their dataset of 2,000+ customers. Microsoft 365 accounts were specifically identified as prime targets, with PhaaS (Phishing-as-a-Service) kits accounting for 63% of all account compromise incidents.

At the consumer level, Sift's Q3 2025 Digital Trust Index found that 24% of consumers were account takeover victims in 2025, up from 18% in 2024. A US-focused analysis found that 29% of US adults — approximately 77 million people — experienced an ATO incident in 2024.

The median time for an organization to detect a breach was 194 days (IBM/Ponemon 2024), meaning compromised email accounts often remain under attacker control for months before detection.

6.4 Credential Stuffing and Account Takeover

Credential stuffing — the automated testing of leaked email-password pairs against live login portals — has become one of the primary mechanisms through which exposed email credentials are weaponized into active account compromises.

Infostealers harvested an estimated 2.1 billion credentials in 2024, fueling credential stuffing campaigns at industrial scale. Kasada's 2025 ATO Trends Report, based on infiltration of 22 active credential stuffing groups, found that ATO attacks increased 250% in 2024, with attackers deliberately timing attacks around high-traffic periods such as Black Friday and holiday seasons. Of note: 85% of targeted companies already had bot detection in place yet still fell victim, with 65% of ATO attacks using sophisticated automation including CAPTCHA bypasses and residential proxies.

The password reuse crisis directly enables credential stuffing at scale. A 2025 Cybernews study analyzing 19 billion passwords exposed in breaches between April 2024 and April 2025 found that 94% of passwords are reused or duplicated across multiple accounts — with only 6% classified as unique. SpyCloud's parallel analysis found that 70% of users exposed in breaches reuse old, compromised passwords. Stolen credentials are involved in credential-based attacks accounting for 22% of all breaches (Verizon 2025 DBIR), making credential misuse the single top breach-initiation method.

Attack chain illustration: Once a credential stuffing campaign identifies a live email-password match, the attacker gains inbox access to: (a) harvest password reset emails from connected services, (b) search for financial, HR, and credentials data within the inbox, (c) set inbox rules to hide suspicious activity, and (d) launch outbound phishing using the trusted internal sender identity.

6.5 Email Phishing Statistics

Phishing remains the most high-volume and most consequential email-based attack vector. The APWG recorded approximately 4.8 million phishing attacks in 2024 — the highest annual total since its founding in 2003, representing a 20% increase over 2023. Phishing attack volume rebounded in Q1 2025 to 1,003,924 quarterly attacks, the highest quarterly figure since Q4 2023's 1.07 million, before spiking further to 1,130,393 in Q2 2025.

The APWG Q4 2025 report noted that wire transfer BEC attacks in Q4 2025 increased 136% compared to Q3 2025, and that scam impersonations increased on every social media platform throughout 2025. Phishing remains the dominant initial access vector in EU incidents, accounting for 60% of all initial intrusion observations in ENISA's 2025 Threat Landscape analysis of 4,875 incidents.

The velocity of phishing attacks is notable. Verizon 2024 DBIR found the median time to click a phishing link once the email is opened is 21 seconds, with credential entry occurring just 28 seconds later — making the entire credential theft transaction approximately under 60 seconds. This window is far shorter than most alert and response timelines.

SaaS/Webmail platforms — representing email service providers including Microsoft 365 and Google Workspace — were the most-attacked sector in Q1 2025, targeted in 17.6% of all phishing campaigns. Financial institutions and online payment platforms combined for an additional 30.9% of attacks in the same period.

6.6 Phishing as a Driver of Email Credential Theft

Phishing is not merely one attack type among many — it is the principal pipeline through which email credentials are stolen at scale. Proofpoint's telemetry from its 2024 State of the Phish report covers 2.8 trillion scanned emails across 230,000 organizations worldwide, with results showing that 76% of organizations experienced credential and/or account compromise as a result of successful phishing in the 2023 reporting year. Financial penalties from phishing-driven incidents rose 144% year-over-year, and reputational damage increased 50%.

Cloudflare's 2023 Phishing Threats Report — drawn from analysis of 13 billion emails — found that 35.6% of all email threat indicators involve deceptive links designed to harvest credentials, and that 89% of malicious emails successfully pass SPF, DKIM, or DMARC authentication checks, demonstrating the limitations of protocol-based defenses.

Proofpoint's 2025 Human Factor Vol. 2 report found URLs are used 4x more often than attachments in malicious emails, and at least 55% of smishing messages contained malicious credential-harvesting URLs. From Hornetsecurity's analysis of 70+ billion emails in 2025, phishing increased 21% year-over-year and malicious URLs accounted for 22.7% of all email threats.

6.7 Business Email Compromise

Business email compromise is the most financially damaging form of email-based attack and the clearest illustration of how compromised email accounts translate into direct financial harm. The FBI IC3's 2024 Annual Report records $2.77 billion in BEC losses across 21,442 reported incidents in 2024 — approximately $130,000 average loss per incident. Since BEC's first inclusion in the IC3 report in 2015, cumulative global losses have exceeded $55.5 billion, representing a 1,025% increase in a decade.

BEC attacks increasingly exploit email account takeover rather than mere spoofing. Microsoft's Digital Defense Report 2024 highlighted inbox rule manipulation as a favored post-compromise technique: once in control of a mailbox, attackers create rules that redirect emails containing financial keywords to Spam, Deleted Items, or Conversation History — hiding the fraud from the legitimate user. The Verizon 2025 DBIR noted that 88% of basic web application attacks involved stolen credentials, often targeting email authentication portals first.

The geography of BEC attacks is evolving. Abnormal AI's 2026 Attack Landscape Report — analyzing 800,000 email attacks across 4,600+ organizations between July and December 2025 — found that 61% of BEC is now vendor-related, with attackers impersonating suppliers, contractors, and partners rather than internal executives, exploiting trusted third-party relationships that employees are less likely to scrutinize.

6.8 Consumer Email Account Compromise

Consumer email account compromise — affecting personal Gmail, Outlook, Yahoo, and similar accounts — is widely underreported relative to enterprise incidents, but its scale is substantial. Sift's Q3 2025 Digital Trust Index found 24% of consumers fell victim to ATO in 2025, up from 18% in 2024, suggesting an accelerating consumer-facing ATO trend. Four out of five consumers who experienced ATO reported they would stop using the affected service — indicating significant reputational and economic consequences for email providers and connected platforms.

Consumer accounts are particularly vulnerable due to lower MFA adoption rates, higher rates of password reuse, and their use as recovery addresses for financial, health, and government accounts. The SpyCloud data showing that the average exposed consumer has 141 credential pairs and 229 records tied to their identity underscores that consumer email compromise rarely stays isolated to a single account.

6.9 AI-Generated Phishing Trends

AI-generated phishing represents the most rapidly escalating qualitative shift in the email threat landscape. Between September 2024 and February 2025, security researchers at Keepnet and VIPRE identified AI usage in 82.6% of all detected phishing emails — a 53.5% year-over-year increase, driven by the widespread availability of large language model tools that allow attackers to generate personalized, grammatically flawless, context-aware emails at near-zero marginal cost.

The performance differential is stark. AI-generated phishing achieves 54–60% click-through rates compared to approximately 12% for traditional phishing, due to the removal of classic warning signs: poor grammar, awkward phrasing, and generic templates. AI campaign costs have simultaneously dropped by 95%+, making highly personalized spear-phishing economically viable at previously impossible scale.

ENISA's 2025 Threat Landscape confirmed that "over 80% of all phishing emails identified between September 2024 and February 2025 used AI to some extent," with attackers exploiting commercial LLMs as well as jailbroken models including WormGPT, EscapeGPT, and FraudGPT. IBM's 2025 analysis found that 37% of breaches now involve AI-generated phishing as the primary attack method.

The Hoxhunt 2026 Phishing Trends Report — built from 50 million data points across 4 million users — provides the sharpest near-term indicator: in December 2025, AI-generated phishing attacks that successfully bypassed email filters surged 14x in a single month, with their share of all detected attacks rising from 4% to 56%. This suggests AI-enabled phishing transitioned from an emerging threat to a dominant attack modality within weeks, driven by campaigns coordinated over the holiday period when security team attention is reduced.

6.10 QR-Code Phishing (Quishing) Trends

Quishing — the embedding of malicious URLs within QR codes included in phishing emails — has evolved from an experimental technique to a mainstream attack vector. QR-code phishing's share of all phishing payloads has grown from 0.8% in 2021 to approximately 12% in 2024–2025, a near-15-fold increase in payload adoption. Cofense tracked a 331% year-over-year increase in QR-code phishing campaigns, and a separate 2023 spike saw quishing incidents rise by 587% in a single year.

The technical appeal of QR-codes to attackers is clear: QR images bypass conventional URL-based email security filters, which cannot extract and evaluate the URL embedded within an image. Venza's 2025 analysis found 22% of phishing emails now use QR codes, with 56% impersonating Microsoft's two-factor authentication reset notifications specifically — a design choice that exploits the very security mechanisms intended to protect email accounts. Credential phishing dominates 89.3–90% of all quishing campaigns, with C-level executives found to be 40 times more likely to fall victim than average employees.

The H2 2025 surge was particularly dramatic. Keepnet Labs data shows QR-code phishing detections growing from 46,969 in August 2025 to 249,723 in November 2025 — a more than fivefold increase in four months, with the APWG simultaneously recording a notable quishing spike in Q1 2025 out of its 1,003,924 total quarterly phishing detections.

Approximately 68% of quishing attacks specifically target mobile users, exploiting the lower security posture of personal devices used to scan QR codes. The average business loss from a successful quishing attack exceeds $1 million per incident according to industry estimates, reflecting the credential and financial access that follows successful inbox compromise.

6.11 Deepfake-Assisted Phishing Trends

Deepfake-assisted phishing — where AI-synthesized audio, video, or image content is used to impersonate trusted individuals — sits at the intersection of BEC and advanced social engineering. When email is the delivery mechanism or target, deepfake phishing directly impacts email account compromise and credential theft.

The most widely cited incident is the February 2024 attack on Arup, a global engineering firm, in which a finance employee was deceived into transferring $25 million after attending a video call in which every participant — including the company's CFO — was a real-time AI deepfake created from publicly available footage. This incident established deepfake-assisted BEC as a credible enterprise-scale threat.

By early 2026, AI deepfakes were identified in approximately 40% of all BEC incidents, up from under 5% in 2023. The barrier to entry has collapsed: commodity tools available on dark-web markets can clone a voice from three seconds of audio for under $20. The dark web trade in deepfake tools specifically rose 223% between Q1 2023 and Q1 2024.

The CISA- and Cloudflare-validated survey finding that 55% of CISOs identify deepfakes as a moderate-to-significant threat suggests broad awareness but still-limited deployment of countermeasures. Deepfakes as a share of all fraud attacks reached 6.5% in 2025, representing a 2,137% increase from 2022.

Important note: The 40% BEC deepfake figure should be treated with caution; it derives from a single source without a disclosed sample size. Cross-source validation data is limited. Deepfake-assisted phishing is a confirmed and growing threat vector but its precise share in email compromise remains difficult to measure industry-wide.

6.12 MFA Bypass and Session Theft in Email Account Compromise

Multi-factor authentication is no longer a reliable guarantee of email account security against sophisticated phishing operations. Adversary-in-the-Middle (AiTM) phishing kits — which position a reverse proxy between the victim and the legitimate email authentication portal — intercept live session cookies after MFA completes, rendering SMS OTP and TOTP codes ineffective against these attacks.

Proofpoint's 2024 State of the Phish telemetry found that 66 million attacks are launched monthly using the EvilProxy AiTM framework — yet 89% of security professionals still believe MFA provides complete protection against account takeover. eSentire's 2025 data identified PhaaS kits (Tycoon 2FA, FlowerStorm, EvilProxy) as responsible for 63% of all account compromise incidents, with Microsoft Defender for Office 365 blocking over 13 million malicious emails tied to Tycoon 2FA in October 2025 alone.

Sekoia's threat research identified 11 distinct AiTM phishing kits in active commercial operation between January and April 2025, with Tycoon 2FA leading at a 4.8/5 prevalence score. The Canadian Centre for Cyber Security analyzed more than 100 AiTM campaigns targeting Microsoft Entra ID accounts between 2023 and early 2025, finding that by August 2024 nearly 100% of observed campaigns had migrated from traditional credential harvesting to proxy-based session interception, and that 91% of post-compromise activity was BEC.

The only effective defenses against AiTM are FIDO2 hardware keys and passkeys, which cryptographically bind authentication to the legitimate domain, breaking the proxy interception step entirely. The Canadian Centre data shows full-session compromises dropped from approximately 20% in Q3 2023 to 6–7% in Q2 2025 in tenants that adopted phishing-resistant MFA with registered-device conditional access.

7. Email Breach Exposure Model

The following flow model describes how a single breach event can cascade from an exposed email address into full identity and financial compromise. This model synthesizes the empirical attack chain documented across Verizon DBIR, SpyCloud, Kasada, Proofpoint, Canadian Centre for Cyber Security, and eSentire research.Stage 1 — Email Address Appears in a Breach An organization suffers a data breach. The attacker or a secondary buyer extracts the breach dataset, which includes email addresses as user identifiers. The email address enters criminal underground circulation on dark web marketplaces or Telegram channels.

Stage 2 — Email-Password Pair Leaked If the breached database includes password hashes, attackers crack them using GPU-accelerated tools. If the site stored passwords in plaintext, the pair is immediately exploitable. SpyCloud finds 44 exposed credentials per infostealer infection on average.

Stage 3 — Password Reuse Amplifies Risk With 74–94% of users reusing passwords across accounts, a single leaked credential effectively keys multiple accounts. Automated credential stuffing bots test the email-password pair against email providers (Microsoft 365, Gmail, Yahoo), banking portals, and SaaS platforms at rates of thousands of attempts per minute.

Stage 4 — Phishing or Stuffing Targets the User If credential stuffing fails (due to password diversity or rate limiting), attackers pivot to phishing. AI-generated spear-phishing emails using the victim's name, employer, and known services are sent, achieving 54–60% click-through rates in 2025. QR-codes may replace links to bypass email security filters.

Stage 5 — Email Account Is Accessed or Taken Over If MFA is absent or bypassed via AiTM: the attacker gains inbox access. Post-compromise inbox rules are set to redirect security alerts to hidden folders. The attacker uses the inbox to reset passwords on connected accounts, harvest sensitive communications, and identify financial relationships.

Stage 6 — Inbox Contents, Connected Accounts, and Reset Links Exposed The inbox becomes the master key to the victim's digital identity. Reset emails for banking, healthcare, government services, and workplace SaaS flow through the compromised address. Internal BEC campaigns launch from the trusted email identity, with 91% of AiTM post-compromise activities resulting in BEC.

Stage 7 — Downstream Identity, Financial, and Workplace Risks Personal data breach losses reported to FBI IC3 in 2024 reached $1.45 billion across 64,882 reports. BEC incidents cause an average direct loss of $130,000 per incident. The median detection window of 194 days means that accounts can remain compromised for months.

8. Trend Analysis

8.1 What Changed: 2022–2026

The email threat landscape has undergone three structural shifts between 2022 and 2026:

Shift 1 — Scale of credential exposure accelerated dramatically. SpyCloud's annual recaptured password volumes grew from 760 million (2022) to 1.38 billion (2023) to 3.1 billion (2024) — a 307% three-year increase. Infostealer malware replaced opportunistic data breaches as the primary mechanism for fresh credential harvesting, with 61% of 2024 breaches now malware-related.

Shift 2 — AI transformed phishing from volume to precision. Traditional phishing competed on volume (billions of generic emails); AI-generated phishing competes on conversion (fewer, more targeted, higher-click-rate emails). The click-rate gap — 12% traditional vs. 54–60% AI-generated — confirms that AI-assisted campaigns are qualitatively different. ENISA's confirmation that over 80% of phishing emails use AI marks the end of the pre-AI phishing era.

Shift 3 — MFA defeat became mainstream. AiTM phishing kits democratized session-cookie theft, enabling attacks against MFA-protected accounts at commercial scale. EvilProxy's 66 million monthly attacks and Tycoon 2FA's 13 million monthly email blocks indicate the post-MFA phishing era is already underway.

8.2 Is Email Account Compromise Increasing?

All available indicators point to a sustained increase in both the volume and severity of email account compromise:

Complicating factor: Better detection tools (Microsoft Defender, behavioral analytics, PhaaS kit identifiers) are simultaneously improving detection rates, meaning some portion of measured growth reflects improved visibility rather than purely new attack volume.

8.3 How Phishing Tactics Are Evolving

The most significant tactical evolution is the shift from link-based to multi-modal phishing:

Learn more about How Spammers Use Multiple Domains.

8.4 Regional and Industry Exposure

Where data is available:

Geographically, the US accounts for the largest absolute volume of breached accounts since 2004 (3+ billion), followed by Russia (2.4 billion) and China (1.1 billion). In 2025, US accounts represented 33%+ of all globally breached accounts (142.9 million of 425.7 million). ENISA notes the EU is characterized by concentrated attacks on public administration, which received 38% of all ransomware and breach incidents in 2025.

By sector, the Verizon 2024 DBIR showed that in the education sector 86% of breaches involve compromised credentials, and the professional/technical services sector had the highest confirmed data disclosures. In the APAC region, phishing against organizations grew 30.5% year-over-year in 2024, with Japan and Singapore seeing 37% spikes.

9. 2026–2030 Forecast

9.1 Methodology

The following forecasts are derived from:

These are modeled projections, not guaranteed outcomes. Each scenario represents a distinct bundle of assumptions described below.

9.2 Scenario Assumptions

Conservative Scenario (Best Case for Defenders):

Moderate Scenario (Persistence with Adaptation):

Aggressive Scenario (Adversary Advantage):

9.3 2030 Prediction Table


Metric
AI phishing share of all phishing
QR-code phishing share
Annual phishing attack volume
Annual BEC losses (USD)
ATO incident rate growth vs 2024
% email breaches containing AI-generated lure
Deepfake share of BEC
Unique email addresses in global breach databases
Share of phishing bypassing email auth (SPF/DKIM/DMARC)
Consumer ATO victim rate
2024–2025 Baseline2030 Conservative2030 Moderate2030 AggressiveReasoning
82.6% (Sep 2024–Feb 2025) ~87% ~93% ~97% AI is already dominant; saturation is near. Conservative = defenses slow growth; aggressive = near-total AI generation
12% (2025) ~10% (detection improves) ~18% ~28% Conservative: QR-aware filters reduce adoption; aggressive: attackers evolve QR to dynamic codes and SVG embeds
~4.1–4.8M (APWG) ~4.5M ~6M ~9M AI automation lowers marginal cost, increasing volume; conservative reflects partial containment
$2.77B (2024, FBI IC3) ~$2.5B (slight decline with defenses) ~$4.5B ~$7.5B Moderate: AI-BEC grows; conservative: law enforcement and regulation contain losses; aggressive: deepfake BEC scales
Baseline +20% +100% +250% Conservative: passkeys contain growth; moderate: persistent credential reuse; aggressive: AI-automated ATO at consumer scale
~37% (IBM 2025) ~50% ~70% ~90% IBM trend already at 37%; aggressive = near-universal AI phishing for email-specific attacks
~40% (2026, indicative) ~35% (detection improves) ~55% ~75% Conservative: deepfake detection tools mature; aggressive: voice/video cloning becomes trivially cheap
~7.9B (2025, Surfshark) ~8.5B ~9.5B ~11B Steady accumulation continues; aggressive = mega-breach events accelerate exposure
89% (Cloudflare 2023) ~80% (protocols improve) ~85% ~90% Protocol improvements exist but are slow to deploy globally; aggressive = attackers adapt faster
24% of consumers (2025) ~22% (passkeys reduce) ~30% ~45% Conservative: consumer passkey adoption grows; aggressive: AI-automated consumer ATO campaigns proliferate

9.4 Forecast Narrative

The most robust prediction across all three scenarios is the continued dominance and quality improvement of AI-generated phishing. Even in the conservative scenario, AI phishing share approaches near-saturation. The variable is not whether AI phishing dominates, but whether defense-side AI can match offensive AI. Early data suggests offensive AI is ahead: AI phishing achieves 54–60% click rates even against organizations with active training programs.

The quishing trajectory may be the most scenario-sensitive prediction. QR-code phishing grew explosively (0.8% to 12% of payloads) precisely because email security stacks were not designed to evaluate image-embedded URLs. If major email providers update their scanning to evaluate QR code content — as some are beginning to do — the attack's core advantage is neutralized and volume may stabilize or decline even in the conservative case. However, in the aggressive scenario, attackers evolve to dynamic QR codes, SVG-embedded vectors, or QR codes in PDF attachments, staying ahead of detection.

BEC losses are likely to grow in real terms but may be partially contained by the combination of international law enforcement actions, increased mandatory reporting (reducing underreporting), and AI-based anomaly detection in financial workflows. The aggressive scenario assumes deepfake-BEC scales to mid-market organizations, where audio/video calls are less expected to be authenticated.

The accumulated email address exposure base of ~7.9–11 billion unique addresses by 2030 means that for practical purposes, nearly every email user can assume their address is circulating in criminal databases. The relevant risk variable shifts from whether an email address is exposed to how quickly associated credential pairs and session tokens are exploited.

10. Practical Implications

For Regular Email Users

For Employees and Remote Workers

For IT and Security Teams

For Email Providers

For Password Managers and Identity Protection Tools

For SaaS Products Helping Users Manage and Secure Email

Products like Clean Email and similar inbox management tools can play a meaningful role in post-compromise recovery and ongoing risk reduction:

For Content Marketers Covering Email Security

11. Data Gaps and Research Limitations

The following represent the most significant gaps in publicly available data on email-related breach and compromise:

  1. Compromised email account counts: No authoritative global estimate of how many email accounts are actively compromised at any given time exists. Proxy metrics (ATO reports, breach counts) underestimate the actual figure significantly due to the 194-day average detection lag.
  2. Consumer vs. enterprise separation: Most phishing, BEC, and ATO statistics combine consumer and enterprise data without sector-specific breakdown. Research separating Gmail/personal account compromise from Microsoft 365/corporate compromise would significantly improve risk modeling.
  3. AI phishing measurement standardization: The "82.6% AI-generated phishing" figure is based on specific detection windows and a specific vendor's product telemetry. There is no industry-standard definition of "AI-generated" phishing, and measurement methodologies vary significantly across vendors.
  4. Deepfake phishing validation: The 40% BEC deepfake figure comes from a single source. Cross-validated, multi-organization data on deepfake-assisted phishing volume does not yet exist at a statistically robust scale.
  5. Non-US/non-EU data: The vast majority of quantified phishing, BEC, and ATO data derives from US, EU, and global enterprise sources. Consumer-facing data for Asia-Pacific, Latin America, Middle East, and Africa is sparse.
  6. Quishing success rates: Available data addresses quishing volume and attack frequency but not verified success rates (completed credential captures leading to account access). This limits ROI analysis for defenders.
  7. MFA bypass adoption rates: While kit prevalence is well-documented, the proportion of targeted phishing campaigns that specifically deploy AiTM techniques vs. standard credential harvesting is not uniformly measured.
  8. 2026 annual data: At the time of this report's compilation (April 2026), Q1 2026 APWG and FBI IC3 annual data is not yet fully published. The most recent annual data cited is FBI IC3 2024 and APWG Q4 2025.

Source List


#
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
SourceReport/DatasetYearURL/Reference
Verizon 2025 Data Breach Investigations Report 2025 verizon.com
/business/resources/reports/dbir
Verizon 2024 Data Breach Investigations Report 2024 verizon.com
/business/resources/reports/dbir
Microsoft Digital Defense Report 2024 2024 microsoft.com/security/security-insider
Proofpoint State of the Phish 2024 2024 proofpoint.com/resources/threat-reports/state-of-phish
Proofpoint Human Factor Report 2025 Vol. 2 2025 proofpoint.com
FBI IC3 Internet Crime Report 2024 2025 ic3.gov/AnnualReport
APWG Phishing Activity Trends Report Q4 2024 2025 apwg.org/trendreports
APWG Phishing Activity Trends Report Q1 2025 2025 apwg.org/trendreports
APWG Phishing Activity Trends Report Q4 2025 2025 apwg.org/trendreports
ENISA Threat Landscape 2025 2025 enisa.europa.eu/publications/enisa-threat-landscape-2025
SpyCloud Annual Identity Exposure Report 2025 2025 spycloud.com/resource/report/spycloud-annual-identity-exposure-report-2025
SpyCloud Annual Identity Exposure Report 2024 2024 spycloud.com
IBM Cost of a Data Breach Report 2024 2024 ibm.com/reports/data-breach
Kasada 2025 Account Takeover Attack Trends Report 2025 kasada.io
eSentire 2025 Year in Review & 2026 Threat Outlook 2026 esentire.com
Abnormal AI 2026 Attack Landscape Report 2026 abnormal.ai
Hoxhunt 2026 Phishing Trends Report 2026 hoxhunt.com/guide/phishing-trends-report
Surfshark Global Data Breach Monitoring Tool 2025 surfshark.com/research/data-breach-monitoring
Keepnet Labs QR Code Phishing Statistics 2026 2026 keepnetlabs.com/blog/qr-code-phishing-trends
Cloudflare Phishing Threats Report 2023 2023 cloudflare.com
Cloudflare Radar 2025 Year in Review 2025 blog.cloudflare.com/radar-2025-year-in-review
Have I Been Pwned ALIEN TXTBASE breach entry 2025 haveibeenpwned.com
Cybernews Password study: 19B passwords analyzed 2025 cinchops.com (citing Cybernews)
NordPass / Nord Security Database leak trends 2023–2025 2026 nordpass.com
Canadian Centre for Cyber Security AiTM Campaign Analysis 2025 cyber.gc.ca
Sekoia AiTM Phishing Kit Threat Research 2025 2025 sekoia.io
Venza / Barracuda Quishing attack statistics 2024–2025 2025 venza.io
Cofense Q4 2024 Phishing Intelligence Trends 2024 cofense.com
Troy Hunt / Have I Been Pwned Blog: 2B email addresses indexed Nov 2025 troyhunt.com
DeepStrike / Digital Applied Deepfake phishing statistics 2025–2026 2026 deepstrike.io, digitalapplied.com
Bitwarden / LastPass Password reuse survey data 2023–2025 bitwarden.com
Sift Q3 2025 Digital Trust Index 2025 sift.com
Startupdefense / Proofpoint AiTM / EvilProxy analysis 2025–2026 startupdefense.io, proofpoint.com
Mimecast Global Threat Intelligence Report commentary 2025 2025 mimecast.com
VIPRE BEC email statistics 2024 2024 vipre.com
Try Clean Email for Free
*****4.5based on 3,300 user reviews
Get Started
InboxClean Your Mailbox

Use tools like Cleaning Suggestions and Smart Folders to help you quickly clean out an overloaded inbox

Mute unwanted emailsUnsubscribe

Keep unwanted emails out of your inbox by unsubscribing—even from email lists that don’t have an unsubscribe link

Clean your emailsKeep it Clean

Automate repetitive tasks with Auto Clean rules to archive emails as they become old or to sort them into folders

Background
Use filters to find emails you want to clean.Arrow
Screener FeatureArrow
UnsubscribeArrow
Auto CleanArrow
Sender SettingsArrow