{"id":52168,"date":"2023-05-31T00:00:00","date_gmt":"2023-05-31T00:00:00","guid":{"rendered":"urn:uuid:f935eb1f-e9cb-3d47-87cb-8d68e35270f2"},"modified":"2023-05-31T00:00:00","modified_gmt":"2023-05-31T00:00:00","slug":"worldwide-2022-email-phishing-statistics-and-examples","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/","title":{"rendered":"Worldwide 2022 Email Phishing Statistics and Examples"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/email-threats:Large?qlt=80\"><!-- OneTrust Cookies Consent Notice start for trendmicro.com --><!-- OneTrust Cookies Consent Notice end for trendmicro.com --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"Read 2021's worldwide phishing statistics and see examples of how hackers are infiltrating organizations.\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"digital transformation,report,expert perspective,risk management\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"defaultArticleWithHero\"> <meta property=\"article:published_time\" content=\"2023-05-31\"> <meta property=\"article:tag\" content=\"risk management\"> <meta property=\"article:section\" content=\"digital transformation\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/23\/e\/worldwide-email-phishing-stats-examples-2023.html\"> <title>Worldwide 2022 Email Phishing Statistics and Examples<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\">\n<link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendmicro\/clientlibs\/trendmicro-core-2\/clientlibs\/header-footer.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/23\/e\/worldwide-email-phishing-stats-examples-2023.html\"><br \/>\n<meta property=\"og:title\" content=\"Worldwide 2022 Email Phishing Statistics and Examples\"><br \/>\n<meta property=\"og:description\" content=\"Read 2021's worldwide phishing statistics and see examples of how hackers are infiltrating organizations.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/22\/email-threats.png\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"Worldwide 2022 Email Phishing Statistics and Examples\"><br \/>\n<meta name=\"twitter:description\" content=\"Read 2021's worldwide phishing statistics and see examples of how hackers are infiltrating organizations.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/22\/email-threats.png\"> <\/head> <body class=\"articlepage page basicpage context-business context-ciso\" id=\"readabilityBody\" readability=\"47.046728971963\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article hero container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"270577172\">\n<div class=\"col-xs-12 col-md-12 research-layout--columns\">\n<div class=\"col-xs-12 col-md-6 research-layout--inner\" readability=\"7.7381818181818\">\n<div class=\"article-details\" role=\"heading\" readability=\"34.821818181818\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Risk Management<\/p>\n<p class=\"article-details__description\">Explore the need for going beyond built-in Microsoft 365 and Google Workspace\u2122 security based on email threats detected in 2022.<\/p>\n<p class=\"article-details__author-by\">By: Trend Micro <time class=\"article-details__date\">May 31, 2023<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-xs-12 col-md-6 research-layout--inner\">\n<figure class=\"research-layout--figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/22\/email-threats.png\" alt=\"email-threats\"> <\/figure>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-lg-8 col-lg-push-2\"> <\/p>\n<div>\n<div class=\"richText\" readability=\"32.295112781955\">\n<div readability=\"13.105263157895\">\n<p>Remote and hybrid work environments have become the new norm. The fact that email become increasingly integral to your business operations, has led malicious actors to favor email as an attack vector. In 2022, Trend Micro\u2122 Cloud App Security discovered nearly <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">40 million high-risk email threats<\/a>, in addition to those detected by built-in Microsoft 365 and Google Workspace security. As threat actors become stealthier and more organized, it\u2019s more important than ever to take your organizational defenses beyond native security.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/g\/going-beyond-built-in-security-email-threats-in-2021\/cloud-app-security-solution.png\" alt=\"cloud-app\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"39.698252069917\">\n<div readability=\"29.203311867525\">\n<p>While the recent expansion of <a href=\"https:\/\/www.weforum.org\/agenda\/2022\/12\/hybrid-working-remote-work-office-senior-leaders\/\" target=\"_blank\" rel=\"noopener\">work from home<\/a> (WFH) and <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">hybrid<\/a> labor forces caused gaps in cloud security to be exploited, cybercriminals continued to leverage blind spots in email services\u2019 built-in security. In fact, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/rethinking-tactics-annual-cybersecurity-roundup-2022\">54% of all threats blocked<\/a> by Trend Micro in 2022 were email threats.<\/p>\n<p>Unfortunately, built-in security for popular email services, like Microsoft 365 and Google Workspace, is simply not enough to stop malicious emails from infiltrating enterprises. Tools like Cloud App Security have become a vital part of your defense strategy, as this security platform supplements built-in security and acts as a second layer of defense that can catch highly evasive and complex threats.<\/p>\n<p><span class=\"body-subhead-title\">Malware attacks surged, known malware detections dropped<\/span><\/p>\n<p>Trend detected and blocked <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">4.3 million malicious files<\/a> in 2022. This represents a 29% rise when compared to 2021. The number of unknown malware threats also spiked to <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">3.8 million<\/a>, indicating a substantial 46% surge. Nevertheless, it is important to mention that the number of known malware files to 505,838, representing a <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">32% decline<\/a>.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/g\/going-beyond-built-in-security-email-threats-in-2021\/known-and-unknown.png\" alt=\"known-and-unknown-malware\"><figcaption>Figure 1. Known and unknown malware detections in 2021 and 2022<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"34.10875331565\">\n<div readability=\"19.490716180371\">\n<p>This drop in detections can be ascribed to a <a href=\"https:\/\/techcrunch.com\/2022\/07\/22\/microsoft-office-macros-blocked-default\/\" target=\"_blank\" rel=\"noopener\">measure implemented by Microsoft<\/a> mid-2022. During this period, Microsoft took action to prevent the execution of macro programs in Microsoft 365 documents, particularly those obtained from the internet or received as email attachments. Over the past seven years, the prevailing method for initial access has been through Microsoft 365 documents containing malicious macros, commonly distributed to targets via email.<\/p>\n<p><span class=\"body-subhead-title\">Phishing remains a common attack method<\/span><\/p>\n<p>According to a report by security company Egress, <a href=\"https:\/\/www.computerweekly.com\/news\/365532100\/Nine-in-10-enterprises-fell-victim-to-successful-phishing-in-2022\" target=\"_blank\" rel=\"noopener\">92% of organizations<\/a> have fallen victim to phishing attacks in 2022. This accounts for the <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">29% increase in phishing incidents<\/a> from 2021, where we detected and blocked a total of over 21 million attacks.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/g\/going-beyond-built-in-security-email-threats-in-2021\/phising-detections.png\" alt=\"phising-detection\"><figcaption>Figure 2. Phishing detections in 2021 and 2022<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/g\/going-beyond-built-in-security-email-threats-in-2021\/known-and-unknown-cred.png\" alt=\"known-and-unknown-credentials\"><figcaption>Figure 3. Known and unknown credential phishing detections in 2021 and 2022<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"37.13768115942\">\n<div readability=\"24.45652173913\">\n<p>However, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">239,777 credential phishing links<\/a> were discovered via Computer Vision, an image analysis and machine learning (ML) technology that detects credential phishing emails by checking site content like branded elements and login forms. Our findings represent a whopping 205% increase compared to the 78,556 detections found in 2021.<\/p>\n<p><span class=\"body-subhead-title\">BEC continues to be a lucrative attack option<\/span><\/p>\n<p>Trend Research disclosed that business email compromise (BEC) detections rose to <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">383,928 in 2022, a growth of 35%<\/a>. The number of BEC attacks that were detected via Trend Micro\u2122 Writing Style DNA reached 134,894, while 249,034 were detected through the anti-spam engine, representing a massive 66% increase.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/g\/going-beyond-built-in-security-email-threats-in-2021\/bec-detections.png\" alt=\"bec-detections\"><figcaption>Figure 4. BEC detections via Writing Style DNA and anti-spam engine in 2021 and 2022<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"41.901947148818\">\n<div readability=\"32.590403337969\">\n<p>Cybercriminals continued to evolve their tactics to take advantage of new work setups. Trend Research determined that BEC actors mostly impersonated executives or high-ranking management personnel by spoofing general employees\u2019 names. With arrival of sophisticated chat AI tools are expected to make cybercriminals more adept at these type of spoofs.<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>Visibility across the enterprise is paramount in the new normal of remote and hybrid work environments. You need to continually discover, assess, and mitigate risk across your digital attack surface to keep your users secure and the business out of the headlines.<\/p>\n<p>To gain comprehensive visibility, cybersecurity leaders should leverage a SaaS-based platform that supplements the built-in security features in email platforms like Microsoft 365 and Google Workspace.<\/p>\n<p>SaaS-based solutions like <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration\/cloud-app-security.html\">Cloud App Security<\/a> are easy to set up, use sophisticated techniques like ML, and are a part of our <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/security-operations.html\">Trend Vision One<\/a>\u2122. This single modern cloud-native security operations platform delivers key capabilities like power purpose-built XDR, attack surface management, and zero-trust capabilities so you can move faster than your adversaries and protect business operations.<\/p>\n<p>Learn more about the facts and figures of email threats for 2022 as well as mitigation strategies in our exclusive email threat landscape report: <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">Cybercriminal Tactics, Techniques That Organizations Need to Know<\/a>.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/23\/e\/worldwide-email-phishing-stats-examples-2023.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore the need for going beyond built-in Microsoft 365 and Google Workspace\u2122 security based on email threats detected in 2022. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52169,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9548,9527,9545,9529],"class_list":["post-52168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-digital-transformation","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-report","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Worldwide 2022 Email Phishing Statistics and Examples 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Worldwide 2022 Email Phishing Statistics and Examples 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-31T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/email-threats:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Worldwide 2022 Email Phishing Statistics and Examples\",\"datePublished\":\"2023-05-31T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/\"},\"wordCount\":730,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/worldwide-2022-email-phishing-statistics-and-examples.png\",\"keywords\":[\"Trend Micro CISO : Digital Transformation\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Report\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/\",\"name\":\"Worldwide 2022 Email Phishing Statistics and Examples 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/worldwide-2022-email-phishing-statistics-and-examples.png\",\"datePublished\":\"2023-05-31T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/worldwide-2022-email-phishing-statistics-and-examples.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/worldwide-2022-email-phishing-statistics-and-examples.png\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worldwide-2022-email-phishing-statistics-and-examples\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Digital Transformation\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-ciso-digital-transformation\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Worldwide 2022 Email Phishing Statistics and Examples\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Worldwide 2022 Email Phishing Statistics and Examples 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/","og_locale":"en_US","og_type":"article","og_title":"Worldwide 2022 Email Phishing Statistics and Examples 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-31T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/email-threats:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Worldwide 2022 Email Phishing Statistics and Examples","datePublished":"2023-05-31T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/"},"wordCount":730,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/worldwide-2022-email-phishing-statistics-and-examples.png","keywords":["Trend Micro CISO : Digital Transformation","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Report","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/","url":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/","name":"Worldwide 2022 Email Phishing Statistics and Examples 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/worldwide-2022-email-phishing-statistics-and-examples.png","datePublished":"2023-05-31T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/worldwide-2022-email-phishing-statistics-and-examples.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/worldwide-2022-email-phishing-statistics-and-examples.png","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/worldwide-2022-email-phishing-statistics-and-examples\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Digital Transformation","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-digital-transformation\/"},{"@type":"ListItem","position":3,"name":"Worldwide 2022 Email Phishing Statistics and Examples"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52168"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52168\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52169"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}