May 2025 Trends Report on Phishing Emails

May 2025 Trends Report on Phishing Emails

This report provides statistics, trends, and case details on the distribution volume and attachment threats of phishing emails collected and analyzed in May 2025. The following is a part of the statistics and cases included in the original report.

1) Phishing Email Threat Statistics

In May 2025, the most prevalent type of threat among phishing email attachments was phishing (72%). Threat actors used scripts such as HTML to mimic the screen layout, logo, and font of login pages and advertising pages. Users are prompted to enter their account credentials, which are then sent to the threat actor’s C2 server, or they are redirected to a fake website. This type of phishing also involves inserting hyperlinks into documents such as PDFs to redirect users to the threat actor’s phishing website.

 

Figure 1. Phishing email threat statistics
 

In addition, the data on the distribution change of samples by category in the past six months is reflected, showing the recent trends in threats posed by phishing emails. The statistics on file extensions used in attachments to phishing emails are also provided, allowing readers to identify the file formats used in phishing emails. Readers can refer to the original ATIP report to view more statistics not covered in this summary.

 

2) Distribution of Korean Emails

This section categorizes cases that are written in Korean and partially discloses the subject and file name of attachments. This allows readers to identify the keyword information that frequently appears in phishing email threats.

Figure 2. Some of the phishing emails distributed in Korean

 

3) Case Study on Phishing Email Distribution

ASEC analyzed the major cases of phishing email attacks that occurred in May according to the format of the attachments (Script, Document, Compress). Through this, users can check the phishing email attack cases that actually occurred this month. In addition to the phishing page (FakePage) using a script attachment, this month saw the distribution of malware through phishing emails that exploited the vulnerability of document attachments. When the document file is executed, the equation editor (EQNEDT32.EXE) vulnerability (CVE-2017-11882) is exploited to run the Lokibot malware. Furthermore, there has been an increase in cases where PE files (.exe) are compressed in ZIP and distributed as phishing emails. Additional information such as the analysis information and the body of the phishing email that distributed the malware, including the C2 address, can be found in the original ATIP report and ATIP Notes.

 

Figure 3. Malware distributed as an attachment in document format

 

Figure 4. Malware distributed as an attachment in Compress format

 

This post has shared a portion of the May 2025 Trend Report on Phishing Email. The original ATIP report contains additional information, such as the recent distribution trends of phishing (FakePage) and malware, statistics and distribution by attachment file extension, and analysis of actual phishing email attacks.

 

※ For more information, please refer to the attached file.

MD5

0e54e6be35a6225946c972cbe74b27a8
119a118372a79cfd77a033c852bd3f90
1738d827615a61618e11e32f3c7e7727
2dab94f34371ebffedd6aa3eb3d4ecd7
2e303a4645788483adfb221f9c8d37d0