The digital landscape is a double-edged sword. While it offers unprecedented opportunities for growth and connection, it also harbours ever-evolving threats. Among the most persistent and damaging of these is phishing. Far from being a static nuisance, phishing attacks constantly morph, leveraging new technologies and psychological tactics to deceive unsuspecting victims. The consequences can be devastating, ranging from significant financial losses and operational disruption, as starkly highlighted by the recent M&S cyberattack, to severe reputational damage that can take years to repair.
This post will delve into the murky waters of emerging phishing trends, exploring the sophisticated methods attackers are now employing. We will then discuss effective countermeasures, drawing on industry best practices and expert guidance from bodies like the NCSC. We will explain how a robust framework like ISO 27001:2022 provides a structured approach to building resilient defences against these threats. Finally, we’ll discuss how Secure Step Forward can partner with you to navigate this complex environment and fortify your organisation.
Staying ahead of cybercriminals requires understanding their latest playbook. Here are some of the most concerning phishing trends making headlines and threatening businesses today:
One rapidly growing phishing-related threat is SIM-swap fraud. While not new, this technique has seen a dramatic resurgence and increased sophistication, leading to devastating consequences for individuals and businesses. The UK has witnessed an alarming 1,055 per cent increase in unauthorised phone SIM swaps in 2024, with cases logged on the National Fraud Database surging from 289 in 2023 to over 3,000 in 2024, according to fraud prevention service CIFAS. This isn’t just about financial loss; as Simon Miller, director of policy, strategy and communications at CIFAS, warns, "When you lose your identity, it has an enduring long-term impact. SIM swap fraud points to the growing sophistication of frauds and gives them more control over our daily lives.”
The core mechanism of a SIM-swap attack involves a fraudster deceiving or colluding with a mobile network operator's employee to transfer a victim's legitimate phone number to a SIM card controlled by the attacker. Once the victim's phone number is hijacked, the attacker gains control over all incoming calls and SMS messages. This includes one-time passcodes (OTPS) sent for two-factor authentication (2fa), password reset links, and other sensitive notifications, effectively bypassing a critical layer of security for many online accounts.
The effectiveness of SIM-swap fraud lies in its ability to exploit human vulnerabilities and systemic weaknesses in authentication processes. Attackers often gather personal information about their targets through prior phishing campaigns, social media reconnaissance, or data breaches. Armed with this information, they can convincingly impersonate the victim when contacting the mobile carrier, or they may exploit insider threats within the carrier itself. The ease with which some carriers' verification processes can be subverted has been a significant contributing factor to the rise of this threat.
A stark and recent illustration of the severe impact of such attacks is the cyberattack on Marks & Spencer (M&S), a prominent UK retailer. Reports indicated that SIM-swap tactics were a component of the attack vector that allowed criminals access to M&S systems. The fallout for M&S was substantial and immediate. The company experienced a reported loss of over £700 million in market value, a 6.5% drop in its share price, and an estimated halt in daily online revenue of approximately £3.8 million due to the disruption of its online ordering systems. Beyond the direct financial costs, such incidents inflict significant reputational damage, erode customer trust, and can lead to prolonged operational disruption as systems are investigated, secured, and restored. The M&S case, alongside the Co-op also reportedly being affected, serves as a critical wake-up call for all organisations, demonstrating that even well-established businesses are vulnerable and that the financial and operational repercussions of a successful SIM-swap enabled attack can be crippling. This incident underscores the urgent need for organisations to reassess their reliance on SMS-based authentication and to implement more robust, multi-layered security controls to protect against this evolving threat.
A multi-layered defence strategy is essential given phishing attacks' diverse and evolving nature. This involves a combination of technical safeguards, robust processes, and, critically, a well-informed and vigilant workforce. Drawing from industry best practices and guidance from bodies like the UK's National Cyber Security Centre (NCSC), here are key mitigations organisations should consider:
1. Advanced Email Filtering & Anti-Phishing Solutions: Deploy sophisticated email security gateways that use machine learning, sandboxing, and threat intelligence to detect and block malicious emails, including those with suspicious links, attachments, or sender impersonation attempts.
2. Robust Multi-Factor Authentication (MFA): Implement strong MFA for all user accounts, especially for sensitive systems and data access. Move beyond SMS-based OTPs where possible, favouring more secure methods like authenticator apps, hardware tokens (FIDO2/WebAuthn), or biometric authentication. This directly counters the effectiveness of SIM-swap attacks if SMS is not the sole or primary second factor.
3. URL Filtering and DNS Protection: Utilise services that block access to known malicious websites and domains. This can prevent users from landing on phishing sites even if they click a malicious link.
4. Endpoint Detection and Response (EDR): EDR solutions provide advanced threat detection, investigation, and response capabilities on endpoints (laptops, desktops, mobile devices), helping to identify and contain malware or suspicious activities resulting from successful phishing.
5. NCSC-Advised SIM-Swap Specific Defences:
1. Comprehensive Security Awareness Training: Regular, engaging, and up-to-date training is paramount. This should cover:
* Recognising various phishing types (email, SMS/smishing, voice/vishing, QR code/quishing).
* Identifying social engineering tactics and red flags (urgency, threats, unusual requests, unexpected messages – always pause, stop, think, and get a second opinion if unsure).
* Understanding the risks of AI-generated deepfakes and highly personalised attacks.
* Safe practices for handling links, attachments, and requests for sensitive information.
* The importance of verifying unexpected requests through separate, trusted communication channels.
* Recognising SIM-Swap Indicators: Sudden loss of phone signal (device no longer connected to the network, though Wi-Fi may work), inability to make/receive calls/texts, loss of access to email/bank/social media accounts, and noticing unauthorised transactions.
2. Phishing Simulation Exercises: Conduct regular, realistic phishing simulations to test employee awareness and reinforce training. Use the results to identify areas for improvement and provide targeted follow-up training.
3. Clear Reporting Mechanisms: Establish transparent and straightforward procedures for employees to report suspicious emails, messages, or potential incidents without fear of blame. Ensure these reports are promptly investigated.
4. Strong Identity Verification Processes: Implement stringent identity verification processes that go beyond easily obtainable information for account recovery, password resets, or changes to sensitive account details (like phone numbers or bank details). Ensure strong, unique passwords are used for key accounts.
1. Incident Response Plans: Develop and regularly test incident response plans that address phishing attacks and account takeovers, including SIM-swap scenarios. These plans should outline roles, responsibilities, communication channels, containment, eradication, and recovery steps. **If a SIM-swap is suspected, immediately contact your bank and mobile service provider.
2. Supplier Due Diligence & Management: Conduct thorough security due diligence for services that involve customer communication or authentication (e.g., telecommunication providers, SMS aggregators, email service providers). Ensure contractual agreements include clear security requirements and responsibilities, particularly preventing and detecting fraudulent activities like unauthorised SIM swaps.
3. Principle of Least Privilege: Ensure users only have access to the information and systems necessary for their roles. This limits the potential impact if an account is compromised via phishing.
By implementing these combined technical, human-centric, and process-oriented mitigations, organisations can significantly strengthen their defences against the ever-evolving landscape of phishing threats.
While specific countermeasures are crucial, a structured and holistic approach to information security management is essential for sustained defence against phishing and other cyber threats. This is where the ISO 27001:2022 standard provides invaluable guidance. ISO 27001 is an internationally recognised framework for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). Its risk-based approach helps organisations identify threats (like the various phishing techniques discussed), assess vulnerabilities, and implement appropriate controls to mitigate those risks.
Several Annexe A controls within ISO 27001:2022 are directly or indirectly pertinent to building a robust defence against phishing:
By implementing these and other relevant controls within an ISO 27001-compliant ISMS, organisations don’t just tick boxes; they build a resilient, adaptive, and comprehensive defence-in-depth strategy. This framework ensures that security measures are not ad hoc but part of a continual cycle of risk assessment, treatment, monitoring, and improvement, which is essential for combating the ever-evolving threat of phishing.
Navigating the complex landscape of phishing threats and implementing a comprehensive framework like ISO 27001:2022 can seem daunting, especially for organisations already stretched thin. At Secure Step Forward, we specialise in helping businesses like yours build resilient information security postures tailored to your specific risks and operational needs.
Our expertise in information security, governance, risk, and compliance (GRC) means we can provide practical, actionable support in several key areas to combat phishing and strengthen your overall security:
Understanding that every organisation is unique, we provide pragmatic solutions that fit your resources and business objectives. Whether you want to enhance specific defences against phishing, achieve alignment with ISO 27001, or develop a comprehensive information security strategy, we are here to help.
Ready to strengthen your defences against sophisticated phishing attacks?
Contact us today for a consultation, or visit our website to learn how we can help you protect your valuable assets and maintain business continuity.
The surge in sophisticated phishing attacks, from SIM swaps to AI-driven campaigns, poses a clear and present danger to organisations of all sizes. As the M&S incident starkly illustrates, a successful breach can have immense financial and reputational costs. However, businesses can significantly reduce their risk by understanding these emerging threats and adopting a proactive, multi-layered defence strategy.
This strategy must encompass robust technical safeguards, vigilant and well-trained employees, and clearly defined security processes. The ISO 27001:2022 standard provides an excellent, internationally recognised framework for structuring these defences, ensuring a holistic and continually improving approach to information security.
Protecting your organisation is not just about implementing tools; it’s about fostering a culture of security and resilience. By taking proactive steps now, you can safeguard your operations, protect your data, and maintain the trust of your customers in an increasingly challenging digital world. Don’t wait to become the next headline – take control of your cybersecurity posture today.