Related reading
Attack Vectors
Attack Vectors Interpretation
More related reading
Defensive Measures
Defensive Measures Interpretation
More related reading
Financial Losses
Financial Losses Interpretation
More related reading
Incidence Rates
Incidence Rates Interpretation
More related reading
Victim Profiles
Victim Profiles Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
Alexander Schmidt. (2026, February 13). Phishing Attack Statistics. Gitnux. https://gitnux.org/phishing-attack-statistics
Alexander Schmidt. "Phishing Attack Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/phishing-attack-statistics.
Alexander Schmidt. 2026. "Phishing Attack Statistics." Gitnux. https://gitnux.org/phishing-attack-statistics.
Sources & References
- Reference 1DOCSdocs.apwg.org
docs.apwg.org
- Reference 2VERIZONverizon.com
verizon.com
- Reference 3PROOFPOINTproofpoint.com
proofpoint.com
- Reference 4IC3ic3.gov
ic3.gov
- Reference 5KNOWBE4knowbe4.com
knowbe4.com
- Reference 6IBMibm.com
ibm.com
- Reference 7STATISTAstatista.com
statista.com
- Reference 8TRANSPARENCYREPORTtransparencyreport.google.com
transparencyreport.google.com
- Reference 9AKAaka.ms
aka.ms
- Reference 10ENISAenisa.europa.eu
enisa.europa.eu
- Reference 11PHISHLABSphishlabs.com
phishlabs.com
- Reference 12FTCftc.gov
ftc.gov
- Reference 13BLOGblog.cloudflare.com
blog.cloudflare.com
- Reference 14BARRACUDAbarracuda.com
barracuda.com
- Reference 15ZSCALERzscaler.com
zscaler.com
- Reference 16CISCOcisco.com
cisco.com
- Reference 17SECURELISTsecurelist.com
securelist.com
- Reference 18DOCSdocs.broadcom.com
docs.broadcom.com
- Reference 19AKAMAIakamai.com
akamai.com
- Reference 20SOPHOSsophos.com
sophos.com
- Reference 21MIMECASTmimecast.com
mimecast.com
- Reference 22ABNORMALSECURITYabnormalsecurity.com
abnormalsecurity.com
- Reference 23HORNETSECURITYhornetsecurity.com
hornetsecurity.com
- Reference 24KEEPNETLABSkeepnetlabs.com
keepnetlabs.com
- Reference 25SLASHNEXTslashnext.com
slashnext.com
- Reference 26NETCRAFTnetcraft.com
netcraft.com
- Reference 27AREA1SECURITYarea1security.com
area1security.com
- Reference 28COFENSEcofense.com
cofense.com
- Reference 29PONEMONponemon.org
ponemon.org
- Reference 30APWGapwg.org
apwg.org






