Back to Blog
Threat Intelligence

The Rise of AI-Powered Phishing: What You Need to Know

Mo·Founder & Principal Consultant
||6 min read

Phishing has always been the most reliable initial access vector, but it used to have a tell: broken grammar, generic greetings, and formatting that felt off. Large language models have erased those signals almost entirely, and the results are alarming.

What Has Changed

Generative AI tools allow attackers to produce phishing content that is contextually relevant, grammatically flawless, and personalized at scale. Specific capabilities that have shifted the balance include:

  • Fluent multilingual output: Attackers can now target victims in any language without hiring native speakers.
  • Persona mimicry: Given a few samples of someone's writing style, an LLM can generate messages that closely match their tone and vocabulary.
  • Rapid iteration: A/B testing phishing templates is trivial when generating new variations takes seconds.
  • Deepfake voice and video: AI-generated audio clones have already been used in business email compromise (BEC) attacks to impersonate executives on phone calls.

Real-World Impact

In 2025, multiple organizations reported BEC attacks where the attacker used an AI-generated voice clone to authorize fraudulent wire transfers over the phone. The FBI's Internet Crime Complaint Center noted a 38% increase in reported BEC losses year over year, with AI-assisted attacks accounting for a growing share.

Spear phishing campaigns that once took days of manual reconnaissance now take minutes. An attacker can feed a target's LinkedIn profile, recent company press releases, and public filings into an LLM and receive a convincing pretext in seconds.

Why Traditional Defenses Fall Short

Legacy email security gateways rely heavily on signature matching, known malicious sender reputation, and basic content analysis. AI-generated phishing bypasses these controls because:

  • Each message is unique, defeating signature-based detection.
  • Attackers use compromised or freshly registered domains with no reputation history.
  • The content quality is indistinguishable from legitimate business communication.

Defending Against AI-Powered Phishing

Effective defense requires layered controls that go beyond content inspection:

  • Implement DMARC, DKIM, and SPF rigorously to prevent domain spoofing. Enforce a p=reject DMARC policy on all sending domains.
  • Deploy behavioral email analysis tools that flag anomalies in communication patterns rather than relying solely on message content.
  • Require out-of-band verification for sensitive actions like wire transfers, credential resets, and vendor payment changes. A phone call to a known number defeats most phishing scenarios.
  • Update security awareness training to focus on procedural verification rather than spotting typos. Employees should be trained to verify requests through trusted channels regardless of how legitimate an email looks.
  • Adopt phishing-resistant MFA such as FIDO2 hardware keys, which eliminate credential theft even when a user clicks a malicious link.

Looking Ahead

AI-powered phishing is not a future threat; it is a present reality. The organizations best positioned to withstand it are those that assume every inbound message could be adversary-crafted and build verification processes accordingly. Technology helps, but process discipline is what ultimately breaks the attack chain.

Share this article:

Need help with your security?

Our team of security experts can help you assess, build, and strengthen your organization's security posture. Let's talk.

Get in Touch