PhishMe; then and now

Share Now


Q: When did it start?

A: We started building early prototypes of PhishMe in 2007, had beta customers in the first part of 2008 and paying customers later that year.

Q: What is it?

A: PhishMe is a subscription to use the PhishMe infrastructure to facilitate the most effective and memorable spear phishing awareness training around.

Organizations pay for a one year license based on the number of people to be trained, to send as many spear phishing training campaigns as they see fit.  It replicates Click-Only, Data Entry, and Attachment based spear phishing attacks.  We provide stories and themes to get people started, but subscribers are welcome to craft their own.  Subscribers manage recipient groups, pick their phishing themes, and customize the education message that is presented to anybody that falls for the phish. It also helps them keep track of who reported the spear phishing email and reward staff for reporting suspicious emails. Detailed reports show how effective the training is. Subscribers can then select multiple campaigns to build trend reports.   Using PhishMe allows organizations to see real measurable results in awareness improving, using the trend reporting that is provided.

Spear phishing awareness training isn’t a one-and-done event. There are different types of spear phishing attacks and humans need reminders that it doesn’t matter what position they hold in the organization, everyone is a valuable target for a spear phisher.

Q: Who buys PhishMe subscriptions?

A: Organizations that have been Phished multiple times.

It’s extremely frustrating for organizations that own every type of end-point-security product and appliance and have rigorous proactive patching and anti-virus to still get compromised via a spear phishing email.  Their vendors tell them if you buy magic heuristic -cloud-malware appliance X, it will solve their phishing problem.  How does one write a signature for an email that sends a user to a website that simply asks the victim for their username and password?  The truth that the security product vendors don’t want to admit: they can’t. When an organization has an 8 person IR team onsite billing $300hr, looking over at that rack of failed security products is demoralizing. Faced with these circumstances, sending spear phishing emails to the workforce as a means to deliver awareness education about spear phishing stops sounding like a crazy idea.

Q: Who else buys PhishMe?

A: Organizations replacing their own homegrown solution.

Organizations who know they need to do this and have made attempts to build their own solution, but have learned through experience conducting these exercises in a safe controlled manner isn’t as simple as it sounds. What if the recipient is on IE6? Will your page render? What if they open it from a BlackBerry or iPhone? Will their scripts still be able to record the results? What if the end user forwards the training exercise on to digg, slasldot, redditt? You don’t want to be headline news like the Air Force was with their uncontrolled attempt: Many PhishMe customers transition from their own solution to PhishMe because it’s easier, safer, and has better reporting.

Q: Anybody else?

A: Consulting organizations buy professional services licenses to conduct training exercises on behalf of their clients.

Q: Any changes over time?

A: In 2009 and 2010 we saw a shift in our inbound sales.

The word “Phishing” often conjures thoughts about consumer related phishing scams aimed at getting financial information or information that could facilitate identity theft.  In the past two years, the differentiation between spear phishing targeting specific actors in an organization vs. consumer phishing is more well-known.  We began getting inbounds by customers who were aware they needed to proactively address spear phishing, if not from their own experience, from reading about it in trade publications or talking with industry colleagues who were combating the problem.  Still, to this day, the majority of inbound sales leads come from companies who have been compromised via spear phishing. Stories like the RSA breach just help make it more acceptable to disclose “yes, we were compromised by hilarious pictures of cats”.

Organizations don’t need to sit around and wonder if they have a spear phishing problem.  They can find out how bad the problem is and do something about it.

Aaron Higbee

Read More Related Phishing Blog Posts


We use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and remembering your preferences when you visit our website. We also use them to improve the overall performance of our site. You can learn more about the cookies and similar technology we use by viewing our privacy policy. By clicking ‘Accept,’ you acknowledge and consent to our use of all cookies on our website.

This site is registered on as a development site.