Social Engineering Statistics [2026]: 100+ Facts & Trends

30 min readBy Nathan House
Social Engineering Statistics 2026

68% of confirmed breaches involve the human element. Not a firewall misconfiguration. Not an unpatched server. A person clicking, trusting, or responding to something they shouldn't have (Verizon DBIR 2025). Social engineering losses hit $16.6 billion in 2024 (FBI IC3). Vishing surged 442% in six months (CrowdStrike). AI now powers over 80% of phishing campaigns (Abnormal Security). The attackers aren't breaking in — they're being invited in.

Below you'll find 76+ social engineering statistics across 14 sections — covering phishing, vishing, BEC, pretexting, AI-powered attacks, and what actually works to stop them. Sourced from Verizon, FBI IC3, KnowBe4, CrowdStrike, IBM, and 30+ reports. Each section includes original analysis that cross-references the data to surface what no single report shows you.

Key Social Engineering Statistics at a Glance

  • 98% of cyberattacks involve social engineering (Sprinto)
  • $16.6 billion in FBI-reported US social engineering losses in 2024 (+33% YoY)
  • 442% surge in vishing attacks H1 to H2 2024 (CrowdStrike)
  • 80%+ of social engineering is now AI-powered (Abnormal Security)
  • $4.89M average cost per BEC breach (IBM 2025)
  • 33.1% of untrained employees click phishing links (KnowBe4 2025)
  • 86% reduction in click rates after 12 months of training (KnowBe4)
  • 60%+ of phishing engagements are now vishing (Keepnet 2025)

Last updated: March 2026

98%
Attacks use social eng
$16.6B
US losses (2024)
442%
Vishing surge
86%
Training reduces clicks

📊 Key Social Engineering Numbers (2026)

98%
Of Cyberattacks Involve Social Engineering
Source: Sprinto / Industry Analysis

Social engineering is the dominant attack vector in cybersecurity. 98% of cyberattacks involve some form of social engineering (Sprinto), and 68% of attacks originate from email (KnowBe4 2025). The human element is involved in 60% of all breaches (Verizon DBIR 2025), ranging from phishing clicks to credential reuse to pretexting conversations that trick employees into authorizing fraudulent transfers.

The scale is accelerating. FBI-reported US social engineering losses grew 33% year-over-year in 2024 to record highs (FBI IC3). Vishing attacks surged 442% (CrowdStrike 2025). AI now powers over 80% of social engineering activity (Abnormal Security). 91% of security professionals report encountering AI-enabled email attacks in the past 6 months. Yet security awareness training reduces phishing click rates by 86% within 12 months (KnowBe4 2025) — the gap between problem and solution is a training gap, not a technology gap.

Social engineering is not a new threat, but AI has transformed its economics. Prior to 2023, creating a convincing phishing campaign required skilled operators who understood language, psychology, and target context. Now, AI tools can generate perfect phishing emails in any language at 95% lower cost (HBR 2024), clone a voice from 3 seconds of audio (McAfee 2024), and produce deepfake video calls that fooled a finance team into transferring $25 million (CrowdStrike 2024). The barrier to entry for social engineering has collapsed. The data below charts this transformation.

Finding Value Source
Cyberattacks involving social engineering 98% Sprinto / Purplesec
Breaches involving human element 68% Verizon DBIR 2025
Vishing attack surge (H1 to H2 2024) 442% CrowdStrike 2025 Global Threat Report
Cyberattacks originating from email 68% KnowBe4 Financial Sector Threats Report 2025
FBI IC3 BEC losses (2024) $2.77B FBI Internet Crime Report 2024
Average BEC attack cost $4.67M IBM / HoxHunt
Social engineering powered by AI 80%+ Abnormal Security / Xceedance
Baseline phishing click rate (untrained) 33.1% KnowBe4
Click rate reduction after training 86% KnowBe4
Orgs citing phishing/social eng as top risk 42% WEF Global Cybersecurity Outlook 2025
Social eng as primary attack vector 42% SentinelOne / Industry Reports
Social eng share of all threats (Q1 2024) 90% Avast Q1 2024 Threat Report
Breaches involving human element 60% Verizon DBIR 2025
US social engineering losses (2024) $16.6B FBI IC3 2024

Record US Social Engineering Losses

US social engineering losses surged from $12.5B in 2023 to $16.6B in 2024 — a 33% increase year-over-year. BEC alone accounted for $2.77B of that total. The FBI has recorded $55.5B in cumulative BEC losses over the past decade, making it the most financially devastating social engineering technique on record. (FBI IC3 2023, 2024)

The Human Element Refuses to Shrink

Despite billions spent on security technology, humans remain the primary breach vector. 60% of breaches involve the human element (Verizon 2025), 98% of cyberattacks involve social engineering (Sprinto), and the median time to click a phishing link is just 21 seconds — faster than any automated defence can intervene. 76% of organizations still lack phishing-resistant MFA (Arctic Wolf 2025). Technology alone cannot solve a human problem. (Verizon DBIR 2025, Sprinto, Arctic Wolf 2025)

98%
Social Eng Share
of all attacks
60%
Human Element
of breaches
68%
Email Origin
of attacks
80%+
AI-Powered
of social eng

The convergence of multiple social engineering channels creates compound risk. An attacker might research a target on LinkedIn (reconnaissance), send an AI-crafted phishing email (initial access), follow up with a deepfaked voice call from their "CEO" (vishing), and request an urgent wire transfer via BEC. Each layer adds credibility. Each layer is now cheaper and more convincing thanks to AI. The organizations that defend against only one channel remain exposed to the others.

🎭 Social Engineering Attack Types Breakdown

Donut chart showing social engineering attack types: phishing 44%, pretexting 27%, BEC 20%, vishing 5%, other 4% (Verizon DBIR 2025)
BREAKDOWN
Phishing (email) 36% (36%)
Vishing (voice) 25% (25%)
Pretexting 20% (20%)
BEC 12% (12%)
Smishing/Other 7% (7%)

These techniques span multiple channels. Email phishing remains the largest category, but vishing (voice phishing) surged to account for 60%+ of phishing engagements in Q1 2025 (Keepnet). Pretexting now represents 50%+ of all incidents (Verizon DBIR 2025), nearly doubling from prior years. Smishing click rates of 19-36% dwarf email phishing's 2-4% (Eftsure), making SMS the most effective per-message channel.

New attack techniques are emerging rapidly. Fake CAPTCHA campaigns surged 1,450% in Q1 2025 (Secureframe). Fake road toll smishing scams spiked 2,900% from 2023 to 2024 (APWG). AI-generated BEC emails now account for 40% of all BEC messages (VIPRE 2024). The attack surface is expanding faster than defences can adapt.

Social Engineering Attack Type Explorer

Select an attack type to see key statistics for each social engineering technique.

Phishing (Email)

Daily phishing emails3.4 billion
Share of breaches16%
AI-generated share80%+
Median time to click21 seconds
Click rate (untrained)33.1%
Finding Value Source
Phishing in data breaches 36% Verizon DBIR 2025
Pretexting share of social eng attacks 50%+ Verizon DBIR 2025
Social eng incidents involving pretexting 50%+ Verizon DBIR 2025
Vishing attack surge (2025) 442% CrowdStrike 2025 Global Threat Report
Vishing share of phishing engagements Q1 2025 60%+ Keepnet Labs
Smishing YoY surge 40% APWG / Keepnet
Smishing share of mobile attacks 35% SentinelOne / Industry Reports
SMS phishing click-through rate 19-36% Sprinto / Eftsure
Smishing/vishing breaches 19% Verizon DBIR 2025
Identity-based phishing incidents 60% Cisco Cybersecurity Readiness Index 2025
BEC emails that were AI-generated 40% VIPRE Security Group Q2 2024
Fake CAPTCHA campaign surge Q1 2025 1,450% Secureframe / Industry Reports
Fake road toll smishing surge 2,900% APWG / Eftsure

Pretexting Now Dominates Social Engineering

Pretexting — creating a fabricated scenario to extract information — now accounts for 50%+ of all social engineering incidents and 27% of social engineering breaches (Verizon DBIR 2025). This represents a near-doubling from prior years. Attackers have shifted from mass-blast phishing to targeted, story-driven attacks that exploit specific organizational contexts. Combined with AI-generated content, pretexting attacks are increasingly difficult to distinguish from legitimate communication. (Verizon DBIR 2025)

SMS Phishing Is 9x More Effective Than Email

Smishing click-through rates range from 19-36%, compared to just 2-4% for email phishing (Eftsure). That makes SMS phishing up to 9x more effective per message. Combined with a 40% YoY surge in smishing volume (APWG/Keepnet) and a 2,900% spike in fake toll scams (APWG), mobile-first social engineering is the fastest-growing attack channel. (Eftsure, APWG, Keepnet 2025)

Emerging Social Engineering Techniques

Beyond the established categories, several newer techniques are gaining traction. Fake CAPTCHA campaigns surged 1,450% in Q1 2025 — attackers present a fake "verify you're human" page that actually executes malicious code. QR code phishing (quishing) uses QR codes in emails or physical locations to bypass email URL scanning. Callback phishing combines email with phone follow-up: the email creates the context, the phone call extracts the credentials.

Multi-channel attacks are particularly effective. An attacker might send a LinkedIn connection request (reconnaissance), follow with a phishing email referencing a shared connection (credibility), then make a vishing call impersonating the shared connection (trust exploitation). Each channel reinforces the others. Defending against these layered approaches requires training that covers all vectors, not just email.

Supply chain social engineering targets the trust relationships between organizations. Attackers compromise a vendor's email account and use it to send invoices or requests to the vendor's clients. Because the email comes from a legitimate, trusted address, it bypasses both technical filters and human suspicion. IBM reports that third-party breaches doubled year-over-year to 30% of all incidents in 2025 — many originating from social engineering of supply chain partners.

📈 How Common Is Social Engineering?

Horizontal bar chart showing social engineering attack growth rates: deepfake vishing +1,633%, vishing overall +442%, traditional phishing +202%, smishing +40% (2024-2025)
Social Eng Share of All Threats
98 /100

It is the single most prevalent attack vector in cybersecurity. 98% of cyberattacks involve some form of social engineering (Sprinto), and it accounted for 90% of all threats in Q1 2024 (Avast). 3.4 billion phishing emails are sent daily. The FBI IC3 received 193,407 phishing complaints in 2024 alone. 70% of organizations were targeted by vishing attacks (Keepnet 2025), and even small organizations face a 70% weekly probability of receiving a BEC email (Abnormal Security).

The frequency continues to accelerate. 91% of security professionals reported encountering AI-enabled email attacks in the past 6 months (Secureframe). Scam phone calls reached 2.56 billion in 2025 (Truecaller). Microsoft processes 600 million+ password attacks per day, many originating from social engineering-harvested credentials. These are not occasional events — they are a continuous, industrialized assault on human trust.

Finding Value Source
Cyberattacks involving social engineering 98% Sprinto / Purplesec
Social eng share of all threats (Q1 2024) 90% Avast Q1 2024 Threat Report
Social eng as primary attack vector 42% SentinelOne / Industry Reports
Phishing emails sent daily 3.4 billion AAG IT / industry data
Phishing attacks reported annually 3.8 million APWG Phishing Activity Trends
Phishing attacks Q2 2025 1,130,393 APWG Phishing Activity Trends Q2 2025
Scam phone calls reported (2025) 2.56 billion Truecaller / Programs.com
Organizations targeted by vishing 70% Keepnet Labs
Weekly BEC probability (small orgs) 70% Abnormal Security / Hoxhunt
Microsoft: password attacks per day 600 million+ Microsoft Digital Defense Report 2024
Security pros reporting AI email attacks 91% Abnormal Security / Secureframe

Social Engineering Is Industrial-Scale Crime

3.4 billion phishing emails daily. 2.56 billion scam calls yearly. 600 million+ password attacks per day on Microsoft alone. Social engineering is not a niche threat — it is the dominant criminal enterprise of the digital age. The sheer volume means that even a low success rate translates to millions of successful compromises annually. At a 2.7% email phishing click rate and 3.4 billion daily emails, that is approximately 92 million successful clicks per day — each one a potential breach entry point. (Verizon DBIR 2025, Truecaller 2025, Microsoft 2024)

The frequency data reveals a critical insight: social engineering is not a targeted, sophisticated attack — it is a numbers game. Attackers send billions of messages knowing that even a small percentage will succeed. This is why awareness training (reducing the click rate) has such outsized impact. Reducing the baseline click rate from 33.1% to 4.1% does not just reduce risk by 86% — it fundamentally changes the economics of social engineering for attackers, making your organization an unprofitable target.

📧 Business Email Compromise (BEC) Statistics

$55.5B
Cumulative FBI BEC Losses (Decade)
Source: FBI IC3

BEC is the most financially devastating form of social engineering. FBI IC3 reported $2.77 billion in BEC losses in 2024, and cumulative losses over the past decade have reached $55.5 billion (FBI IC3). The average cost per BEC breach is $4.89 million (IBM 2025), making it the second most expensive breach type after ransomware.

BEC attacks are increasing in both volume and sophistication. SpiderLabs documented a 15% increase in BEC emails in 2025 (LevelBlue). 63% of organizations experienced BEC in the past year (AFP 2025). BEC volume surged 54% in H1 2025 compared to 2023 (Abnormal Security). 40% of BEC emails are now AI-generated (VIPRE 2024), making them harder to detect by both humans and traditional email filters. Even organizations with fewer than 1,000 employees face a 70% weekly probability of a BEC attack.

Finding Value Source
FBI IC3 BEC losses (2024) $2.77B FBI Internet Crime Report 2024
FBI IC3 BEC losses (2023) $2.9B FBI Internet Crime Report 2023
FBI cumulative BEC losses (decade) $55.5B FBI IC3
Average BEC attack cost (IBM) $4.67M IBM / HoxHunt
Average cost per BEC breach $4.89M IBM Cost of a Data Breach Report 2025
BEC share of all incidents 27% Arctic Wolf Threat Report 2025
Average BEC loss per incident $160,000+ Arctic Wolf Threat Report 2025
BEC share of financially motivated breaches 58% Verizon DBIR 2025
BEC volume surge (H1 2025) 54% Abnormal Security
BEC attack increase in 2025 15% SpiderLabs / LevelBlue
BEC emails AI-generated 40% VIPRE Security Group Q2 2024
Organizations experiencing BEC (2025) 63% AFP Fraud Survey 2025
Weekly BEC probability (<1,000 employees) 70% Abnormal Security / Hoxhunt

BEC: Low-Tech, High-Return Crime

BEC requires no malware, no exploits, and no technical sophistication — yet it costs organizations millions per incident (IBM 2025) and has accumulated tens of billions in FBI-reported losses over a decade. 63% of organizations experienced BEC in the past year (AFP 2025), and even small organizations (<1,000 employees) face a 70% weekly probability of receiving a BEC email. BEC is the most cost-effective attack for criminals. (IBM 2025, FBI IC3, AFP 2025, Abnormal Security)

BEC Attack Characteristics

  • No malware or exploits needed
  • Exploits trust and authority
  • 40% now AI-generated
  • Targets finance departments

BEC Defence Measures

  • Dual-approval for wire transfers
  • Out-of-band verification (phone callback)
  • AI-powered email analysis
  • Regular BEC simulation exercises

BEC attack sophistication is accelerating. Traditional BEC relied on simple email spoofing — impersonating an executive to request a wire transfer. Modern BEC campaigns use AI to craft contextually perfect emails, compromise legitimate accounts to send from trusted addresses, and combine email with vishing follow-up calls to add urgency. The shift from volume-based to precision-based BEC means that individual attacks are more likely to succeed and harder to detect.

The FBI's cumulative decade-long BEC loss figure likely underrepresents the true cost. Many organizations do not report BEC losses to law enforcement. Many more absorb smaller losses without formal incident reporting. The actual global cost of BEC is almost certainly higher than FBI figures suggest.

BEC Attack Patterns

BEC attacks follow recognizable patterns that organizations can defend against. The most common BEC scenario is CEO fraud — an attacker impersonates the CEO or CFO and requests an urgent wire transfer. Invoice fraud is the second most common: attackers compromise a vendor's email account and send modified invoices with updated bank details. Payroll diversion targets HR departments: an employee's direct deposit information is changed to the attacker's account.

Each pattern has specific defensive measures. CEO fraud is defeated by dual-approval requirements and out-of-band verification (calling the CEO on a known number to confirm). Invoice fraud is defeated by verifying payment detail changes through a separate communication channel and maintaining a vendor contact database independent of email. Payroll diversion is defeated by requiring in-person or video verification for banking detail changes.

The rise of AI-generated BEC makes these procedural controls more important than ever. 40% of BEC emails are now AI-generated (VIPRE 2024), meaning they lack the linguistic tells that previously helped recipients identify fraudulent requests. The only reliable defence is process-based: verification steps that are independent of the communication channel being compromised.

BEC Recovery & Law Enforcement

Speed is critical in BEC recovery. When organizations detect a fraudulent transfer within 24 hours and contact both their bank and the FBI IC3's Recovery Asset Team (RAT), recovery rates are significantly higher. The FBI's RAT has successfully frozen and recovered hundreds of millions of dollars in fraudulent BEC transfers. However, most organizations detect BEC fraud too slowly — the median time between transfer and detection is often days or weeks, by which point the funds have been moved through multiple accounts and are unrecoverable.

Organizations should pre-establish relationships with their bank's fraud team and have FBI IC3 reporting procedures ready before an incident occurs. Every hour of delay reduces recovery probability significantly. Cyber insurance policies increasingly cover BEC losses, but typically require proof that reasonable security controls were in place at the time of the incident — including awareness training and dual-approval procedures.

📞 Vishing Statistics & Voice-Based Attacks

Vishing Attack Surge
442%
+442% H2 2024

Voice phishing has transformed from a minor annoyance into a primary attack vector. Vishing attacks surged 442% from H1 to H2 2024 (CrowdStrike). Deepfake-enabled vishing spiked 1,633% in Q1 2025 compared to Q4 2024 (Keepnet). It now accounts for over 60% of all phishing-related engagements, overtaking email as the dominant phishing channel in Q1 2025.

AI voice cloning is the catalyst. McAfee found that AI can clone a person's voice from just 3 seconds of audio (McAfee 2024). 25% of users are fooled by deepfake voices (Keepnet). The largest single deepfake vishing loss was $25 million, where a finance executive was tricked via a video call with a deepfaked CFO (CrowdStrike). Scam phone calls reached 2.56 billion in 2025 (Truecaller). Deloitte projects deepfake fraud costs will reach $40 billion by 2027.

Finding Value Source
Vishing attack surge (H1 to H2 2024) 442% CrowdStrike 2025 Global Threat Report
Voice phishing increase YoY 442% CrowdStrike 2025 Global Threat Report
Deepfake vishing surge Q1 2025 1,633% CrowdStrike / Keepnet
Organizations targeted by vishing 70% Keepnet Labs
Vishing share of phishing engagements 60%+ Keepnet Labs
Users fooled by deepfake voices 25% Keepnet Labs
Median loss per vishing victim $1,400 FTC / Keepnet
Scam phone calls (2025) 2.56 billion Truecaller / Programs.com
People targeted by AI voice scams 25% McAfee
Audio needed to clone a voice 3 seconds McAfee
Largest deepfake CFO scam $25.6M CrowdStrike 2025 Global Threat Report
Projected deepfake fraud costs (2027) $40B Deloitte
Smishing/vishing breaches 19% Verizon DBIR 2025

The economics of vishing have shifted dramatically. Traditional phone scams required human operators, limiting scale. AI-generated voice calls can now be produced at negligible cost with text-to-speech systems that are indistinguishable from real humans. Combined with AI voice cloning (3 seconds of audio is sufficient per McAfee), attackers can impersonate specific individuals — a CEO calling from an "unknown number" asking the CFO to authorize an emergency transfer. The $25 million deepfake CFO scam documented by CrowdStrike in 2024 demonstrates the upper bound of what is possible.

Defending against vishing requires procedural controls that many organizations lack. Callback verification on a known number (not the number provided by the caller) is the most effective defence. Organizations should establish code words for high-value authorizations, require dual approval for financial transfers, and train employees to recognize the urgency tactics that vishing attackers use. Technical solutions such as AI-powered call analysis and caller authentication (STIR/SHAKEN) provide additional layers but cannot replace human vigilance.

Vishing: From Nuisance to Primary Threat

Voice phishing surged 442% from H1 to H2 2024 (CrowdStrike), deepfake-enabled vishing spiked 1,633% in Q1 2025 (Keepnet), and vishing now accounts for 60%+ of all phishing-related engagements. Cross-referencing with McAfee's data showing AI can clone a voice from just 3 seconds of audio, the economics are clear: vishing is now cheaper, faster, and more convincing than email phishing. (CrowdStrike 2025, Keepnet 2025, McAfee 2024)

Vishing Risk Factors

  • AI can clone voice from 3 seconds of audio
  • 25% of users fooled by deepfake voices
  • 70% of organizations targeted
  • 60%+ of phishing engagements are voice-based

Vishing Defences

  • Voice verification protocols for transfers
  • Callback verification on separate channel
  • Employee training on vishing tactics
  • AI-powered call analysis tools

🤖 AI-Powered Social Engineering

AI-Powered Social Engineering Share 80%+ / 100%
82%

AI has fundamentally changed social engineering. Over 80% of social engineering activity is now AI-powered (Abnormal Security 2025). AI-generated phishing performance improved 55% from 2023 to 2025 (Hoxhunt), while costs dropped 95% compared to manual campaigns (HBR 2024). 91% of security professionals reported encountering AI-enabled email attacks in the past 6 months. 40% of BEC emails in mid-2024 were identified as AI-generated (VIPRE).

Deepfakes represent the next frontier. AI can clone a voice from 3 seconds of audio (McAfee 2024), and deepfake-enabled vishing surged 1,633% in Q1 2025 (Keepnet). IBM reports that deepfakes and AI-generated phishing are emerging as distinct attack methods in breach campaigns (IBM 2025). The traditional advice to "look for spelling errors" in phishing emails is obsolete — AI-generated social engineering is grammatically perfect, contextually relevant, and increasingly personalized.

The democratization of AI-powered social engineering is perhaps the most significant shift in the threat landscape. Previously, convincing social engineering required skilled operators who understood language, psychology, and context. Now, freely available AI tools can generate perfect phishing emails in any language, create deepfake audio and video, and even conduct real-time chatbot conversations that impersonate support agents. The barrier to entry for social engineering has effectively dropped to zero.

On the defensive side, AI is also being deployed. AI-powered email gateways can detect AI-generated phishing by analyzing writing patterns, sender behaviour, and contextual anomalies. AI call analysis can flag deepfake voices in real time. However, this creates an AI arms race where attacker AI and defender AI continuously evolve. The current evidence suggests that attacker AI is ahead: 80%+ of social engineering is AI-powered (Abnormal Security), but defender AI adoption lags significantly.

Finding Value Source
Social engineering powered by AI 80%+ Abnormal Security / Xceedance
Security pros reporting AI email attacks 91% Abnormal Security / Secureframe
AI-generated phishing success rate 82.6% Keepnet Labs / VIPRE Security Group
AI phishing click-through rate 54% Harvard Business Review / Heiding, Schneier et al.
AI phishing cost reduction vs manual 95%+ Harvard Business Review / Heiding, Schneier et al.
BEC emails that were AI-generated 40% VIPRE Security Group Q2 2024
AI phishing improvement 2023 to 2025 55% Hoxhunt / Industry Reports
Users fooled by deepfake voices 25% Keepnet Labs
Deepfake vishing surge Q1 2025 1,633% CrowdStrike / Keepnet
Deepfake as attack method 35% IBM Cost of a Data Breach Report 2025
AI phishing as attack method 37% IBM Cost of a Data Breach Report 2025
AI used by attackers in breach campaigns 16% IBM Cost of a Data Breach Report 2025

AI Phishing Outperforms Human Operators

AI-generated phishing now powers 80%+ of social engineering attacks (Abnormal Security 2025). AI phishing performance improved 55% from 2023 to 2025 (Hoxhunt), while costs dropped 95% compared to manual campaigns (HBR 2024). 91% of security professionals report encountering AI-enabled email attacks in the past 6 months. Human-crafted phishing is becoming the exception, not the norm. (Abnormal Security, Hoxhunt, HBR 2024)

95% less
AI Phishing Cost
vs manual campaigns
40%
AI BEC Share
of BEC emails
55%
AI Improvement
2023 to 2025

AI Voice Cloning & Deepfake Social Engineering

AI voice cloning has made vishing dramatically more dangerous. McAfee demonstrated in 2024 that just 3 seconds of audio — available from a voicemail greeting, conference recording, or social media post — is sufficient to create a convincing voice clone. This technology has enabled the largest-ever social engineering fraud: a finance executive tricked into transferring $25 million via a video call featuring deepfaked versions of multiple colleagues (CrowdStrike 2024).

Deepfake-enabled vishing surged 1,633% in Q1 2025 compared to Q4 2024 (Keepnet), indicating explosive adoption by criminal organizations. 25% of users are fooled by deepfake voices in controlled tests (Keepnet). The Deloitte projection of $40 billion in deepfake fraud costs by 2027 reflects the expectation that this technology will become the standard social engineering toolkit within 2-3 years.

Defending against AI voice cloning requires a fundamental shift in verification procedures. Organizations can no longer trust voice identification as an authentication factor. Code words, callback verification on pre-registered numbers, and multi-party approval for high-value transactions are the minimum required controls. AI-powered call analysis tools that can detect synthetic speech are emerging but remain early-stage. The window for proactive defence is now — before AI voice attacks become the default social engineering technique.

AI-Generated Phishing: The End of Spelling Errors

For decades, the primary advice for detecting phishing was to look for spelling errors, grammatical mistakes, and awkward phrasing. AI has eliminated these signals entirely. AI-generated phishing emails are grammatically perfect, contextually appropriate, and personalized to the target's role, industry, and recent activities. The 55% improvement in AI phishing performance from 2023 to 2025 (Hoxhunt) reflects rapid model improvement in social engineering applications.

The cost reduction is equally significant. AI phishing campaigns cost 95% less than equivalent human-crafted campaigns (HBR 2024). This means attackers can run vastly more campaigns at the same budget, or target a much wider range of organizations. The combination of lower cost and higher effectiveness explains why 80%+ of social engineering is now AI-powered (Abnormal Security 2025) and why 91% of security professionals report encountering AI-enabled email attacks.

New detection strategies are needed. Rather than looking for linguistic errors, employees should focus on behavioural red flags: unexpected requests, urgency pressure, requests for credentials or financial transfers, and communication through unusual channels. Technical defences should employ AI-powered analysis of sender behaviour patterns, email authentication (DMARC/DKIM/SPF), and anomaly detection that identifies AI-generated content signatures.

🖱️ Social Engineering Success Rates & Click Rates

2-4%
Email Phishing
click rate
19-36%
SMS Phishing
click rate
33.1%
Untrained Staff
phishing click rate

Social engineering success rates vary dramatically by channel and target. Untrained employees have a baseline phishing click rate of 33.1% (KnowBe4 2025). SMS phishing achieves click rates of 19-36%, compared to just 2-4% for email phishing (Eftsure) — making smishing up to 9x more effective per message. The median time from email delivery to click is just 21 seconds (Verizon DBIR 2025), far too fast for any human review process.

AI-generated phishing achieves click rates comparable to human-crafted campaigns but at 95% lower cost (HBR 2024). Healthcare employees are the most vulnerable industry group at 41.9% baseline click rate (KnowBe4 2025). After 12 months of continuous security awareness training, click rates drop to 4.1% — an 86% reduction that demonstrates the gap is addressable. The challenge is not technology but implementation.

Finding Value Source
Users who click phishing links 2.7% Verizon DBIR 2025
Median time to click phishing link 21 seconds Verizon DBIR 2025
Median time to report phishing 28 minutes Verizon DBIR 2025
AI phishing click-through rate 54% Harvard Business Review / Heiding, Schneier et al.
Baseline click rate (untrained employees) 33.1% KnowBe4
Click rate after 12 months of training 4.1% KnowBe4
SMS phishing click rate (vs 2-4% email) 19-36% Sprinto / Eftsure
Healthcare baseline click rate (highest) 41.9% KnowBe4

The click rate data reveals a critical asymmetry. Attackers need only one click to succeed. Defenders need every employee to resist. In a 1,000-person organization with a 33.1% click rate, 331 employees will click a phishing link. Even at the trained rate of 4.1%, 41 employees remain vulnerable. This is why defence-in-depth — combining training with technical controls like phishing-resistant MFA, email filtering, and endpoint detection — is essential. No single layer is sufficient.

The 21-second median click time (Verizon DBIR 2025) is faster than most people spend considering an email. This suggests that the most effective training focuses not on teaching people to analyze emails in detail, but on building an automatic "pause and verify" reflex — similar to looking both ways before crossing a street. The goal is not analysis but hesitation: just enough friction to break the 21-second impulse.

The Channel Effectiveness Gap

Cross-referencing click rate data across channels reveals a stark effectiveness gradient. Email phishing: 2-4% click rate. AI-enhanced email phishing: comparable to human-crafted at 95% lower cost. SMS phishing (smishing): 19-36% click rate (9x email). Voice phishing (vishing): 60%+ of phishing engagements, with 25% of users fooled by deepfake voices. The clear trend: the more personal the channel, the higher the success rate. Defenders must expand beyond email-only protection. (Eftsure, Verizon DBIR 2025, Keepnet 2025, KnowBe4 2025)

💰 Cost of Social Engineering Attacks

Line chart showing FBI-reported social engineering losses rising from $4.2B in 2020 to record highs in 2024, a 295% increase over five years
$4.89M
Average Cost Per BEC Breach
Source: IBM Cost of a Data Breach 2025

The financial damage is staggering. FBI-reported US losses grew 33% in 2024 to record levels (FBI IC3). BEC alone accounted for $2.77 billion in FBI-reported losses. The average attack costs $130,000 (Eftsure), while individual BEC breaches routinely run into the millions (IBM 2025).

Cumulative BEC losses over the past decade run into tens of billions (FBI IC3). Stolen credentials — often harvested through social engineering — cost $4.81 million per breach (IBM 2025). The median vishing victim loses $1,400 per incident (FTC/Keepnet). Deloitte projects deepfake fraud costs will reach $40 billion by 2027. The economics overwhelmingly favor attackers: a single BEC email costs nothing to send but can yield millions.

Finding Value Source
US social engineering losses (2024) $16.6B FBI IC3 2024
US social engineering losses (2023) $12.5B FBI IC3 2023
FBI IC3 BEC losses (2024) $2.77B FBI Internet Crime Report 2024
Average BEC attack cost $4.67M IBM / HoxHunt
Average cost per BEC breach $4.89M IBM Cost of a Data Breach Report 2025
Average cost per social engineering attack $130,000 Eftsure / Industry Analysis
Average BEC loss per incident $160,000+ Arctic Wolf Threat Report 2025
Cumulative BEC losses (decade) $55.5B FBI IC3
Projected deepfake fraud costs (2027) $40B Deloitte
Median loss per vishing victim $1,400 FTC / Keepnet
Stolen credentials breach cost $4.81M IBM Cost of a Data Breach Report 2025

Fastest Growing Attacks

  • Deepfake vishing — +1,633% in Q1 2025
  • Fake CAPTCHA — +1,450% in Q1 2025
  • Vishing — +442% H1 to H2 2024
  • Fake toll smishing — +2,900% in 2024

Most Costly Attacks

  • BEC — $4.89M avg per breach
  • Stolen credentials — $4.81M avg
  • Avg social eng attack — $130K
  • Cumulative BEC — $55.5B (decade)

The Return-on-Investment for Social Engineering Criminals

A single BEC email costs nothing to send. A single AI-crafted phishing campaign costs 95% less than its manual equivalent. Yet the average social engineering attack yields six figures, and BEC breaches run into the millions. Cross-referencing attack costs with payouts, social engineering delivers the highest criminal ROI of any cyberattack category. This is why volume continues to increase: the economics overwhelmingly reward attackers. (IBM 2025, HBR 2024, Eftsure, FBI IC3)

The cost structure of social engineering explains its dominance. Unlike ransomware (which requires malware development, infrastructure, and negotiation), or exploit-based attacks (which require zero-day research), social engineering requires only a message and a target. AI has reduced even the message-crafting cost to near zero. The only effective counterweight is making targets harder to deceive — which is exactly what awareness training achieves.

Cost Breakdown by Attack Type

The financial impact varies dramatically by social engineering technique. BEC leads as the costliest breach type (IBM 2025), followed closely by stolen credentials at $4.81 million per breach. These vector-specific costs reflect the depth of compromise: BEC often results in direct financial transfers that are difficult to recover, while credential theft enables persistent access that can escalate to full data exfiltration.

At the individual level, vishing victims lose a median of $1,400 per incident (FTC/Keepnet), but high-value targets can lose millions. The $25 million deepfake CFO scam (CrowdStrike 2024) and the staggering decade of cumulative FBI-reported BEC losses demonstrate the extreme variance in social engineering outcomes. The average attack costs six figures (Eftsure) — but this average masks a distribution where most attacks cost relatively little while a small number of BEC and deepfake attacks cost millions.

Projected costs continue to escalate. Deloitte projects deepfake fraud costs will reach $40 billion by 2027. FBI IC3 losses grew 33% year-over-year in 2024. AI is reducing attack costs while increasing effectiveness. Without intervention, these trends will continue compounding.

🏢 Social Engineering by Industry

Healthcare PPP (Highest) 41.9% / 100%
41.9%

Every industry is a target, but some are more vulnerable than others. Healthcare has the highest baseline phishing click rate at 41.9% (KnowBe4 2025), driven by high-pressure clinical environments where staff prioritize patient care over email scrutiny. Financial services face 300x more attacks than other industries (KnowBe4 2025), and BEC accounts for 27% of all investigated incidents (Arctic Wolf 2025).

Small businesses are disproportionately targeted: employees at small firms receive 350% more attacks than large enterprise employees (StrongDM/Verizon DBIR). SMBs also have higher malicious email rates and fewer resources for awareness training. Phishing and social engineering are cited as the top cyber risk by organizations worldwide (WEF 2025).

Finding Value Source
Orgs citing phishing/social eng as top risk 42% WEF Global Cybersecurity Outlook 2025
Financial sector attack frequency 300x KnowBe4 Financial Sector Threats Report 2025
Healthcare baseline click rate (highest) 41.9% KnowBe4
Financial sector phish-prone rate 44.7% KnowBe4 Financial Sector Threats Report 2025
SMB vs enterprise social eng rate 350% Verizon DBIR / StrongDM
SMB malicious email rate 1 in 323 Verizon DBIR / StrongDM
BEC share of all incidents 27% Arctic Wolf Threat Report 2025

Most Targeted Industries

  • Healthcare — 41.9% baseline click rate
  • Financial Services — 300x attack rate
  • Small Business — 350% more SE attacks

Key Defence Gaps

  • 76% lack phishing-resistant MFA
  • 27% of incidents are BEC
  • 33.1% baseline click rate (untrained)

Healthcare

Healthcare employees have the highest baseline phishing vulnerability at 41.9% (KnowBe4 2025). This is not because healthcare workers are less intelligent — it is because clinical environments create perfect conditions for social engineering: high urgency, frequent interruptions, multiple unfamiliar system logins, and a culture that prioritizes patient care over cybersecurity protocols. Social engineering attacks targeting healthcare often impersonate medical supply vendors, insurance companies, or internal IT support.

Financial Services

Financial services face 300x more attacks than other industries (KnowBe4 2025), driven by the direct financial payoff of successful BEC and wire transfer fraud. Banks and financial institutions are the primary targets for sophisticated pretexting, where attackers build detailed scenarios to manipulate employees into authorizing transactions. BEC targeting finance departments accounts for the majority of cumulative FBI-reported losses.

Small & Medium Businesses

Small business employees receive 350% more attacks than large enterprise employees (StrongDM/Verizon DBIR). This concentration reflects attackers' awareness that SMBs typically have fewer security controls, less frequent training, and smaller IT teams. SMBs also have higher malicious email rates and are less likely to have BEC-specific detection in place. The 70% weekly BEC probability for organizations with fewer than 1,000 employees (Abnormal Security) means that for most small businesses, it is not a question of "if" but "when."

Education & Government

Education institutions face elevated social engineering risk due to open communication cultures, high staff turnover, and large student populations who may lack security awareness. Insurance has the second-highest baseline phishing click rate at 39.2% (KnowBe4 2025), followed by Retail/Wholesale at 36.5%. Government agencies are frequently targeted by both criminal and nation-state social engineering campaigns, with BEC targeting government procurement and finance departments.

The industry-specific data underscores that social engineering risk is universal but varies in intensity and attack pattern. Organizations in every sector need awareness training, but the specific content should reflect industry-specific threats: healthcare staff need training on medical supply vendor impersonation, financial services need training on regulatory-themed pretexting, SMBs need training on CEO fraud and invoice fraud, and government employees need training on nation-state social engineering techniques.

Industry Baseline Vulnerability Rankings

Cross-referencing KnowBe4's phish-prone percentage data across industries reveals a clear vulnerability hierarchy. Healthcare leads at 41.9%, followed by Insurance (39.2%), Retail/Wholesale (36.5%), and the global average (33.1%). Financial services, despite facing 300x more attacks, have a lower baseline PPP — likely reflecting higher existing investment in security awareness. The most vulnerable industries are not those facing the most attacks, but those with the least training investment. (KnowBe4 2025, Arctic Wolf 2025, Verizon DBIR 2025)

🧠 Social Engineering and the Human Factor

Human Element in Breaches
60 /100

People remain the weakest link. 60% of breaches involve the human element — social engineering, errors, and misuse (Verizon DBIR 2025). 88% of breaches are caused by human error (Stanford). 68% of cyberattacks originate from email (KnowBe4). The median time to click a phishing link is 21 seconds, while the median time to report it is 20 hours (Verizon DBIR 2025) — attackers have a massive head start.

76% of organizations still lack phishing-resistant MFA such as FIDO2 or passkeys (Arctic Wolf 2025). Pretexting — using fabricated scenarios to manipulate targets — now accounts for 50%+ of social engineering incidents (Verizon DBIR 2025). Identity-based phishing incidents continue to rise (Cisco 2025). The data is clear: investing in training, MFA, and verification procedures delivers measurable returns, yet most organizations remain under-invested.

Finding Value Source
Breaches involving human element 68% Verizon DBIR 2025
Human element in breaches 60% Verizon DBIR 2025
Breaches caused by human error 88% Stanford University
Users who click phishing links 2.7% Verizon DBIR 2025
Median time to click phishing link 21 seconds Verizon DBIR 2025
Identity-based phishing incidents 60% Cisco Cybersecurity Readiness Index 2025
Orgs without phishing-resistant MFA 76% Arctic Wolf Threat Report 2025
Attacks originating from email 68% KnowBe4 Financial Sector Threats Report 2025
Incidents involving pretexting 50%+ Verizon DBIR 2025

21 Seconds: The Window That Decides Everything

The median time to click a phishing link is 21 seconds (Verizon DBIR 2025). The median time to report it is 20 hours. That gap — 21 seconds to compromise versus 20 hours to detect — is the fundamental human factor cybersecurity challenge. No email gateway, no AI filter, no security policy can operate within that 21-second window. Only trained human judgment can. This is why the 86% reduction from awareness training matters: it shrinks the population of people who click in those first 21 seconds. (Verizon DBIR 2025, KnowBe4 2025)

The human factor in cybersecurity is not a failing to be eliminated — it is a reality to be managed. Every employee is both a potential target and a potential sensor. Organizations that frame security awareness as a "compliance checkbox" see minimal improvement. Organizations that treat every employee as a human firewall — providing continuous training, easy reporting tools, and positive reinforcement for catching threats — see dramatic reductions in social engineering success rates.

The 76% of organizations without phishing-resistant MFA (Arctic Wolf 2025) represents the single largest addressable gap. FIDO2 and passkey deployments eliminate credential phishing entirely — no matter how convincing the social engineering, there is no credential to steal. Combined with awareness training, phishing-resistant MFA creates a layered defence that addresses both the human and technical dimensions of social engineering.

The Psychology Behind Social Engineering Success

Social engineering exploits six fundamental psychological principles: authority (impersonating executives or IT support), urgency (creating time pressure to prevent careful analysis), scarcity (limited-time offers or threats of account closure), social proof (referencing colleagues or shared connections), reciprocity (offering something of value before making a request), and commitment (getting small agreements before escalating to larger requests). AI has not changed these principles — it has simply made their application faster, cheaper, and more personalized.

Understanding these principles is the foundation of effective awareness training. When employees recognize the psychological levers being pulled — "why is this email creating urgency?", "why is this person invoking authority?", "why am I being asked to bypass normal procedures?" — they develop the critical thinking reflexes that reduce click rates by 86%. The most effective training programs explicitly teach these principles and provide examples of how each is used in real social engineering attacks.

The Reporting Gap

The gap between clicking and reporting is a critical human factor challenge. The median time to click a phishing link is 21 seconds (Verizon DBIR 2025). The median time to report a suspected phishing email is 20 hours. This 3,400x differential means that by the time a social engineering attempt is reported, the attacker has had nearly a full business day to exploit the compromised credentials, initiate fraudulent transfers, or move laterally within the network.

Closing this reporting gap requires making reporting frictionless (one-click phishing report buttons), removing fear of punishment for employees who clicked and then reported, and creating a culture where reporting is celebrated rather than stigmatized. Organizations that actively reward phishing reports — even when the employee initially clicked — see dramatically faster reporting times and higher report volumes.

The Reporting Paradox: Punishment Reduces Security

Organizations that punish employees for clicking phishing links in simulations see lower reporting rates — employees hide incidents rather than report them. This creates a worse security posture than having no simulation programme at all. Cross-referencing KnowBe4's training data with Arctic Wolf's incident response data, the most secure organizations combine positive reinforcement for reporting with immediate remedial training for clicking. Zero employees should ever be fired for clicking a phishing link in a simulation. The goal is behaviour change, not punishment. (KnowBe4 2025, Arctic Wolf 2025)

🎓 Security Awareness Training Effectiveness

Bar chart showing phish-prone click rate dropping from 33.1% before training to 18.9% after 90 days to 4.6% after 1 year (KnowBe4 2025)
Click Rate After Training
4.1%
-86%

Security awareness training is the most effective countermeasure against social engineering. KnowBe4's 2025 study of 14.5 million users across 62,400 organizations found that untrained employees have a 33.1% baseline phishing click rate. After just 3 months of training, click rates drop by 40%. After 12 months of continuous training, they drop by 86% to just 4.1%.

Healthcare and Pharmaceuticals have the highest baseline vulnerability at 41.9% (KnowBe4 2025), followed by Insurance at 39.2% and Retail/Wholesale at 36.5%. The global baseline has improved 3.5% year-over-year, indicating a positive shift in overall security awareness. Training works — the data is unambiguous.

Finding Value Source
Baseline PPP before training 33.1% KnowBe4
PPP after 12 months of training 4.1% KnowBe4
Click rate reduction after training 86% KnowBe4
Click rate reduction after 3 months 40% KnowBe4
Training reduces phishing susceptibility <5% KnowBe4 Financial Sector Threats Report 2025
Users analyzed in benchmark study 14.5 million KnowBe4
Healthcare baseline PPP (most vulnerable) 41.9% KnowBe4

The 86% Training Dividend

KnowBe4's study of 14.5 million users found that untrained employees have a 33.1% phishing click rate. After 12 months of continuous training, that drops to just 4.1% — an 86% reduction. In a 1,000-person organization, that means going from ~331 vulnerable employees to ~41. At an average social engineering attack cost of $130,000, even preventing one successful attack pays for multiple years of training. (KnowBe4 2025)

Before Training 33.1% / 100%
33.1%
After 3 Months 19.9% / 100%
19.9%
After 12 Months 4.1% / 100%
4.1%

The data from KnowBe4's benchmark study of 14.5 million users across 62,400 organizations is unambiguous. Training works. The trajectory from 33.1% to 19.9% (after 3 months) to 4.1% (after 12 months) shows that sustained, continuous training delivers compounding returns. Organizations that run quarterly phishing simulations combined with immediate remedial training for those who click achieve the fastest improvement.

Industry-specific baselines vary significantly. Healthcare employees start at 41.9% vulnerability (KnowBe4 2025), followed by Insurance at 39.2% and Retail/Wholesale at 36.5%. These industries require more intensive initial training. The global baseline has improved 3.5% year-over-year, indicating that organizations worldwide are investing in awareness programs — but at 33.1% overall, the majority of the world's employees remain vulnerable to social engineering.

The ROI calculation is straightforward. A 500-person organization with a 33.1% click rate has approximately 166 employees who would click a phishing link. At the average six-figure cost per social engineering incident (Eftsure), even one successful attack costs more than years of awareness training. After training reduces click rates to 4.1%, only 21 employees remain vulnerable — an 87% reduction in attack surface for a fraction of the cost of a single breach.

What Makes Training Effective

Not all security awareness training is equal. KnowBe4's data shows that the 86% reduction requires continuous, multi-format training — not a one-time annual presentation. The most effective programmes combine: monthly phishing simulations (email, SMS, and voice), immediate remedial training for employees who click, quarterly classroom or video training on emerging threats, real-world examples from recent incidents, and positive reinforcement for reporting suspicious messages.

The 3-month checkpoint is critical. KnowBe4 found that click rates drop 40% in just 3 months — meaning organizations see rapid improvement from the initial training investment. However, stopping at 3 months leaves click rates at approximately 20%, still dangerously high. The full 86% reduction requires 12 months of continuous reinforcement. Training is not a project — it is an ongoing programme.

Training content must evolve with threats. Programmes designed around 2020-era email phishing are inadequate for the current threat landscape. Modern training must include AI-generated phishing recognition, vishing scenario exercises, smishing awareness, pretexting identification, BEC response procedures, and deepfake detection. The threat has evolved — training must evolve with it.

Measuring Training Effectiveness

The primary metric for training effectiveness is the Phish-Prone Percentage (PPP) — the percentage of employees who click simulated phishing links. Organizations should track this monthly and benchmark against industry baselines: 33.1% global average, 41.9% healthcare, 39.2% insurance, 36.5% retail (KnowBe4 2025). A well-run programme should achieve sub-10% PPP within 6 months and sub-5% within 12 months.

Secondary metrics include: report rate (percentage of employees who report simulated phishing), time-to-report (how quickly employees flag suspicious messages), and repeat clicker rate (percentage of employees who click multiple simulations). Organizations with high report rates and low repeat clicker rates have the strongest human firewall. Target: >70% report rate, <5% repeat clicker rate, <1 hour median time-to-report.

Use the calculator below to estimate the impact of training on your organization's social engineering risk and the potential cost savings from reducing employee vulnerability.

Security Awareness Training ROI Calculator

Estimate how much your organization could save by reducing phishing susceptibility through awareness training.

🌍 Social Engineering Statistics by Country

🇺🇸 United States

The United States is the largest financial victim worldwide. FBI IC3 reported record social engineering losses in 2024, up 33% year-over-year from $12.5 billion in 2023. BEC losses alone reached $2.77 billion. The FBI received 193,407 phishing complaints in 2024. Over the past decade, cumulative BEC losses reported to the FBI have reached tens of billions.

🇬🇧 United Kingdom

UK businesses face significant social engineering threats. Large UK businesses have the highest breach rates, with social engineering a primary vector (Gov.uk 2025). Small businesses are increasingly targeted, reflecting the global pattern of attackers shifting to less-defended organizations. The UK's National Cyber Strategy continues to emphasize human-focused security measures and mandatory employee training for organizations handling sensitive data.

The UK's Action Fraud service and National Cyber Security Centre (NCSC) report rising volumes of social engineering complaints, with phishing and BEC as the dominant vectors. UK regulatory frameworks including GDPR create additional financial exposure when social engineering leads to data breaches — organizations face potential fines of up to 4% of global annual turnover on top of breach remediation costs.

🌐 Global Trends

Social engineering is a global phenomenon, but regional patterns differ. The Asia-Pacific region has overtaken North America as the most-attacked region (Secureframe). Phishing/social engineering is cited as the top cyber risk by organizations worldwide (WEF 2025). Scam phone calls reached 2.56 billion globally in 2025 (Truecaller). The average per-attack cost remains six figures regardless of geography (Eftsure).

Regional differences in social engineering tactics reflect cultural and technological factors. In APAC, smishing is disproportionately effective due to higher mobile-first internet usage. In Europe, GDPR-themed pretexting (fake data subject access requests) has emerged as a region-specific social engineering technique. In North America, BEC remains the dominant financial threat. In Africa and Latin America, mobile money and SIM swap fraud are the fastest-growing social engineering vectors.

Language barriers that once limited social engineering to English-speaking targets have been eliminated by AI translation. Attackers can now craft grammatically perfect, culturally appropriate social engineering messages in any language, opening global attack surfaces that were previously inaccessible. This expansion is reflected in the APAC region's rise as the most-attacked region worldwide.

🇦🇺 Australia & Asia-Pacific

The Asia-Pacific region has overtaken North America as the most-attacked region for social engineering (Secureframe). This shift reflects APAC's rapid digital transformation, high mobile-first internet usage (which increases smishing effectiveness), and growing economic targets. India faces particularly intense social engineering activity, with rapidly increasing ransomware and phishing volumes. Australia's cybersecurity strategy includes mandatory incident reporting that provides better visibility into social engineering losses.

🇪🇺 European Union

EU organizations face social engineering threats compounded by regulatory exposure. A successful social engineering attack that leads to a data breach triggers GDPR notification requirements within 72 hours, with potential fines of up to 4% of global annual turnover. GDPR-themed pretexting — fake data subject access requests designed to exfiltrate personal data — has emerged as an EU-specific social engineering technique. The EU's NIS2 Directive now mandates security awareness training for critical infrastructure organizations.

Finding Value Source
US social engineering losses (2024) $16.6B FBI IC3 2024
US social engineering losses (2023) $12.5B FBI IC3 2023
FBI IC3 BEC losses (US, 2024) $2.77B FBI Internet Crime Report 2024
FBI phishing complaints (2024) 193,407 FBI Internet Crime Report 2024
UK large business breach rate 74% UK DCMS Cyber Security Breaches Survey 2025
UK small business breach rate 42% UK DCMS Cyber Security Breaches Survey 2025

The Geography of Social Engineering Losses

The US accounts for the largest share of reported social engineering losses (FBI IC3 2024), but this reflects both the scale of the US economy and the FBI's reporting infrastructure. Many countries lack equivalent reporting mechanisms, meaning global losses are significantly underreported. Cross-referencing FBI data with Verizon's global breach database and WEF's survey of 92 countries, social engineering is the top cited cyber risk regardless of geography, GDP, or technological maturity. The threat is universal. (FBI IC3 2024, Verizon DBIR 2025, WEF 2025)

📋 Key Takeaways

  1. 1. Social engineering dominates cybersecurity. 98% of attacks involve social engineering, and 60% of breaches involve the human element. Technical defences alone are insufficient.
  2. 2. Vishing is the fastest-growing threat. Voice phishing surged 442% in H2 2024, deepfake vishing spiked 1,633% in Q1 2025, and vishing now accounts for 60%+ of phishing engagements.
  3. 3. AI has industrialized social engineering. 80%+ of social engineering is AI-powered, AI phishing costs 95% less than manual campaigns, and performance improved 55% in two years.
  4. 4. BEC is the most costly attack type. Tens of billions in cumulative FBI losses, millions per breach on average, and 63% of organizations experienced BEC in the past year.
  5. 5. Training works — provably. 12 months of awareness training reduces phishing click rates by 86% (from 33.1% to 4.1%). This is the single highest-ROI security investment.
  6. 6. SMS phishing is 9x more effective than email. Smishing click rates of 19-36% vs 2-4% for email make mobile-first attacks the fastest-growing threat channel.
  7. 7. MFA adoption remains dangerously low. 76% of organizations lack phishing-resistant MFA. Until this changes, credential harvesting via social engineering will remain the path of least resistance.
  8. 8. Pretexting has nearly doubled. 50%+ of social engineering incidents now involve pretexting — fabricated scenarios designed to manipulate specific targets. Mass-blast phishing is giving way to targeted, story-driven attacks.
  9. 9. Multi-channel attacks are the new normal. Modern social engineering chains email, voice, SMS, and social media. Single-channel defences leave organizations exposed. Train across all vectors, not just email.
  10. 10. The defence ROI is 70-80x. Combined awareness training + phishing-resistant MFA costs ~$60-70K/year for a 500-person org. A single prevented BEC breach saves millions. The economics of defence are overwhelming.

The Multi-Channel Convergence Effect

Cross-referencing attack data across channels reveals that social engineering is no longer single-vector. Email phishing (3.4B daily), vishing (442% surge), smishing (19-36% click rate), pretexting (50%+ of incidents), and BEC ($2.77B FBI losses) now operate as coordinated attack chains. An attacker may research on LinkedIn, phish via email, follow up with a deepfaked voice call, and execute via BEC — each channel reinforcing the others. Single-channel defence is obsolete. (Verizon DBIR 2025, CrowdStrike 2025, Eftsure, FBI IC3)

The Defence Investment Gap

The average social engineering attack costs six figures (Eftsure), and a single BEC breach averages nearly five million dollars (IBM 2025). Security awareness training for a 500-person organization costs approximately $25,000-50,000 per year. Phishing-resistant MFA deployment costs $10-20 per user per year. Combined annual defence cost: ~$60,000-70,000 — a fraction of a single successful BEC incident. The ROI of social engineering defence is 70-80x the investment. Every organization that has not deployed these controls is making an economically irrational decision. (IBM 2025, Eftsure, KnowBe4 2025)

These ten takeaways distill the core message. Social engineering is not a secondary threat — it is the primary attack vector, the most cost-effective criminal enterprise, and the fastest-growing threat category. The good news: training works (86% reduction in click rates), phishing-resistant MFA eliminates credential harvesting, and procedural controls for financial transfers neutralize BEC. The gap between current vulnerability and achievable defence is a resource allocation problem, not a technology problem.

For security leaders building a business case, the numbers are clear: a single prevented BEC incident pays for years of awareness training, phishing-resistant MFA deployment, and procedural controls combined. The cost of inaction — a 33.1% click rate, 442% vishing growth, 80%+ AI-powered attacks — far exceeds the cost of action. Use the interactive risk assessment below to evaluate your organization's current posture.

Social Engineering Risk Assessment

Answer 8 questions about your organization's defences to get a risk score. Maximum score: 13 (well defended).

01

Does your organization conduct regular phishing simulations?

02

Do you have phishing-resistant MFA (FIDO2/passkeys) deployed?

03

Is there a formal security awareness training program?

04

Can employees report suspected phishing with one click?

05

Are voice call verification procedures in place for financial transfers?

06

Does your email gateway detect AI-generated phishing?

07

Is there a BEC-specific detection and response process?

08

Are employees trained to recognise pretexting and vishing?

Social Engineering FAQ

What percentage of cyber attacks involve social engineering?

98% of cyberattacks involve some form of social engineering (Sprinto). The human element is involved in 60% of all data breaches (Verizon DBIR 2025). Social engineering techniques include phishing, vishing, smishing, pretexting, business email compromise, and baiting. These attacks exploit human psychology rather than technical vulnerabilities, making them effective against even the most technologically advanced organizations.

How much does social engineering cost businesses?

US social engineering losses reached $16.6 billion in 2024 (FBI IC3), up 33% from $12.5 billion in 2023. The average BEC breach costs $4.89 million (IBM 2025). The average social engineering attack costs $130,000 (Eftsure). Cumulative BEC losses over the past decade total $55.5 billion (FBI IC3). Deepfake fraud costs are projected to reach $40 billion by 2027 (Deloitte).

What is the most common type of social engineering attack?

Phishing (email-based) remains the most common social engineering technique by volume, with 3.4 billion phishing emails sent daily. However, vishing (voice phishing) overtook email as the dominant phishing channel in Q1 2025, accounting for 60%+ of phishing engagements (Keepnet). Pretexting now represents 50%+ of all social engineering incidents (Verizon DBIR 2025), nearly doubling from prior years. BEC accounts for 27% of investigated incidents (Arctic Wolf 2025).

Does security awareness training reduce social engineering attacks?

Yes, provably. KnowBe4's 2025 study of 14.5 million users across 62,400 organizations found that security awareness training reduces phishing click rates by 86% over 12 months — from a 33.1% baseline to just 4.1%. Even 3 months of training produces a 40% reduction. Healthcare starts highest at 41.9% but sees the same proportional improvement. Training is the single highest-ROI defence against social engineering, and its effectiveness is backed by one of the largest studies in cybersecurity.

How is AI changing social engineering attacks?

AI has fundamentally transformed social engineering. Over 80% of social engineering activity is now AI-powered (Abnormal Security 2025). AI-generated phishing costs 95% less than manual campaigns while maintaining comparable click rates (HBR 2024). AI phishing performance improved 55% from 2023 to 2025 (Hoxhunt). AI can clone a voice from 3 seconds of audio (McAfee 2024), and deepfake-enabled vishing surged 1,633% in Q1 2025 (Keepnet). 40% of BEC emails are AI-generated (VIPRE 2024). 91% of security professionals report encountering AI-enabled email attacks in the past 6 months.

What is the success rate of social engineering attacks?

Social engineering success rates vary by channel and target training level. Untrained employees have a 33.1% phishing click rate (KnowBe4 2025). SMS phishing achieves click rates of 19-36%, making it up to 9x more effective than email phishing at 2-4% (Eftsure). The median time to click a phishing link is just 21 seconds (Verizon DBIR 2025). 25% of users are fooled by deepfake voices in vishing attacks (Keepnet). After 12 months of training, click rates drop to 4.1%.

What is business email compromise (BEC)?

Business email compromise (BEC) is a social engineering technique where attackers impersonate executives, vendors, or trusted contacts via email to trick employees into transferring funds or sharing sensitive information. BEC requires no malware or technical exploitation. FBI IC3 reported $2.77 billion in BEC losses in 2024, with cumulative losses over the past decade reaching tens of billions. 63% of organizations experienced BEC in the past year (AFP 2025). BEC ranks among the costliest breach types (IBM 2025).

What is vishing and why is it growing so fast?

Vishing (voice phishing) uses phone calls to deceive targets into revealing sensitive information or authorizing fraudulent transactions. It surged 442% from H1 to H2 2024 (CrowdStrike) due to AI voice cloning technology that can replicate a person's voice from just 3 seconds of audio (McAfee). Deepfake-enabled vishing spiked 1,633% in Q1 2025 (Keepnet). Vishing now accounts for 60%+ of all phishing engagements, overtaking email as the primary phishing channel. The largest single vishing loss was $25 million (CrowdStrike 2024).

Social Engineering Timeline: The AI Inflection Point

2020
Social engineering accounts for ~80% of cyberattacks. BEC losses at $1.8B annually (FBI IC3). Phishing emails are predominantly human-crafted with identifiable errors.
2021
COVID-19 drives remote work phishing surge. BEC losses rise to $2.4B. Social engineering exploits pandemic uncertainty with vaccine, PPE, and remote access scams.
2022
Pretexting begins overtaking traditional phishing as dominant social engineering technique. Smishing volume increases significantly. Deepfake technology becomes commercially accessible.
2023
ChatGPT and generative AI transform phishing email quality. BEC losses reach $2.9B. AI voice cloning demonstrated from 3 seconds of audio (McAfee). The AI social engineering era begins.
2024
Vishing surges 442% (CrowdStrike). $25M deepfake CFO scam (CrowdStrike). 40% of BEC emails AI-generated (VIPRE). FBI IC3 losses hit record highs. Social engineering becomes AI-first.
2026
80%+ of social engineering is AI-powered (Abnormal Security). Deepfake vishing surges 1,633% in Q1. 98% of attacks involve social engineering. Training proves 86% effective (KnowBe4).

Anatomy of a Modern Social Engineering Attack Chain

🔍
1. Reconnaissance
LinkedIn, social media, company website research
📧
2. Initial Contact
AI-crafted phishing email or smishing message
🎭
3. Pretexting
Fabricated scenario to build trust and urgency
📞
4. Escalation
Deepfake voice call or BEC for authority
💸
5. Extraction
Wire transfer, credential harvest, or data theft

Modern social engineering chains multiple techniques across channels. Defending against any single step is insufficient — organizations need layered controls across the entire attack chain.

Social Engineering vs Other Attack Vectors

Factor Social Engineering Ransomware Exploits
Attack cost Near zero (AI) $$$$ (infrastructure) $$$$$ (zero-day R&D)
Skill required Low (AI assists) Medium High
Success rate 2-36% (varies by channel) Variable High (if unpatched)
Share of breaches 60-98% 44% 20%
Primary defence Training + MFA Backups + EDR Patching
Avg cost per breach $4.89M (BEC) $5.08M $4.24M

Social engineering has the lowest barrier to entry, highest volume, and broadest breach share of any attack category. Sources: IBM 2025, Verizon DBIR 2025, CrowdStrike 2025, HBR 2024.

About This Data

This article draws from 76 statistics aggregated from 50+ authoritative sources including IBM Cost of a Data Breach, Verizon DBIR, CrowdStrike Global Threat Report, WEF Global Cybersecurity Outlook, FBI IC3, ISC2 Cybersecurity Workforce Study, Sophos, Gartner, Mandiant M-Trends, and Ponemon Institute reports.

Derived statistics (marked "Nathan House's Analysis") are computed by cross-referencing data from multiple sources — for example, comparing breach costs across industries using IBM data, or validating ransomware trends across Verizon, Sophos, and HIPAA Journal findings.

All statistics include inline source citations with links to primary sources. Data spans 2023-2026, with preference given to the most recent available figures. Last updated: March 2026.

How to Use This Data

Security professionals can use this data to build business cases for awareness training, justify phishing-resistant MFA deployment, and benchmark organizational vulnerability against industry baselines. The derived insights cross-reference multiple sources to surface what no single report shows.

This page is updated monthly as new reports are published. Bookmark it and return for the latest social engineering attack data. If you spot an outdated statistic or want to suggest a source, contact us.

Key sources used: Verizon Data Breach Investigations Report (DBIR) 2025, IBM Cost of a Data Breach Report 2025, FBI Internet Crime Complaint Center (IC3) Annual Report 2024, CrowdStrike Global Threat Report 2025, KnowBe4 Phishing By Industry Benchmarking Report 2025, Abnormal Security H1 2025 Threat Report, APWG Phishing Activity Trends Reports, Keepnet Labs Vishing Statistics Report, McAfee AI Voice Cloning Study, Eftsure Social Engineering Statistics, Sprinto Cybersecurity Survey, Arctic Wolf Security Operations Report 2025, World Economic Forum Global Cybersecurity Outlook 2025, HBR AI Phishing Study 2024, VIPRE Email Threat Trends 2024, and Hoxhunt Human Risk Benchmark 2025.

About the Author

Nathan House

Nathan House, StationX

Nathan House is a cybersecurity expert with 30 years of hands-on experience. He holds OSCP, CISSP, and CEH certifications, has secured £71 billion in UK mobile banking transactions, and has worked with clients including Microsoft, Cisco, BP, Vodafone, and VISA. Named Cyber Security Educator of the Year 2020 and a UK Top 25 Security Influencer 2025, Nathan is a featured expert on CNN, Fox News, and NBC. He founded StationX, which has trained over 500,000 students in cybersecurity.

Primary Data Sources for Social Engineering Statistics

Verizon DBIR 2025
Breach data from 22,000+ security incidents. Primary source for human element, pretexting, and click rate statistics.
FBI IC3 Annual Report 2024
859,532 complaints with $16.6B in losses. Primary source for BEC, phishing complaints, and US loss data.
KnowBe4 Benchmark Report 2025
14.5 million users across 62,400 organizations. Primary source for training effectiveness and phish-prone percentages.
CrowdStrike Global Threat Report 2025
Attack trend analysis from endpoint telemetry. Primary source for vishing surge and deepfake attack data.
IBM Cost of a Data Breach 2025
604 organizations across 17 countries. Primary source for BEC breach costs and attack vector cost comparisons.
Abnormal Security H1 2025
Email threat intelligence from millions of mailboxes. Primary source for AI-powered social engineering and BEC volume data.

Social Engineering Prevention Checklist

Based on the statistics above, these are the highest-impact actions organizations can take to reduce social engineering risk:

  • Deploy security awareness training — reduces click rates by 86% in 12 months (KnowBe4 2025)
  • Implement phishing-resistant MFA — FIDO2/passkeys eliminate credential phishing entirely (76% of orgs lack this)
  • Establish BEC verification procedures — dual approval and out-of-band verification for financial transfers
  • Run regular phishing simulations — including vishing and smishing scenarios, not just email
  • Deploy AI-powered email security — to detect AI-generated phishing and BEC
  • Create callback verification protocols — for any request involving money, credentials, or sensitive data
  • Train specifically on pretexting — now 50%+ of incidents, requires scenario-based training
  • Establish voice verification code words — for authorizing high-value transactions over the phone