Cofense Logo - Email Security Solutions

Cofense Quarterly Phishing Intelligence Review: 3 Key Takeaways

Share Now

The Cofense Intelligence team released its Quarterly Phishing Intelligence Review for the second quarter of 2022, which highlights significant shifts in the phishing threat landscape, with some key takeaways highlighted below.
Top Five Malware Charts - CofenseTop five malware types in Q2 2022 and Q1 2022, by volume of emails.
  1. Emotet campaigns continued to sustain, however their overall volume dropped significantly compared to the first quarter of 2022, leading to an overall reduction in phishing activity. However, don’t get too comfortable. Four of the top five malware families most frequently delivered via phishing (FormGrabber, Agent Tesla, QakBot, and Remcos RAT) all saw increases in volume.
  2. Changes in QakBot delivery tactics made QakBot a far more potent threat. Phishing campaigns delivering QakBot became the most effective in terms of reaching end users. QakBot campaigns now go to extensive lengths to bypass security measures, avoid detection, and obstruct analysis tactics. Read the report for more details regarding these effective tactics.
  3. Business Email Compromise (BEC) campaigns continue to impart more financial loss on companies than any other cyber threat. Our team dove into what it looks like when a target interacts with a BEC actor as part of our latest strategic analysis.
Screenshot of a phishing email targeting a Business Email Compromise - Cofense

BEC Campaigns Like The One Above Reach End Users Regularly

Tired of reading? Well, great news! You can watch our Quarterly Threat Briefing for Q2, which covers many of the report’s findings, on demand here.


We use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and remembering your preferences when you visit our website. We also use them to improve the overall performance of our site. You can learn more about the cookies and similar technology we use by viewing our privacy policy. By clicking ‘Accept,’ you acknowledge and consent to our use of all cookies on our website.

This site is registered on as a development site.