November 2025 Trends Report on Phishing Emails

November 2025 Trends Report on Phishing Emails

This report provides statistics, trends, and case information on the distribution volume, attachment threats, and other aspects of phishing emails collected and analyzed for one month in November 2025. The following are some of the statistics and cases included in the original report.

1) Statistics of Phishing Email Threats

In November 2025, the most prevalent threat type among phishing emails was phishing (78%). Threat actors used scripts such as HTML to mimic the screen layout, logos, and fonts of login pages and promotional pages, prompting users to enter their account credentials. The credentials are then sent to the threat actor’s C2 server, or users are redirected to a fake website. This type of phishing also involves inserting hyperlinks into documents such as PDF files, which redirect users to the threat actor’s phishing website.

 


Figure 1. Phishing email threat statistics

 

The data also reflects recent trends in threats posed by phishing emails by providing information on the distribution changes of samples in each category over the past six months. Additionally, statistics on the extensions of attachments found in phishing emails are included, allowing readers to gain an understanding of the file formats used in phishing emails. Readers can refer to the full ATIP report for more statistics that are not covered in this summary.

 

2) Distribution of Korean Emails

This section categorizes cases that are composed in Korean and partially discloses the subject and attachment file names of the samples. This information allows readers to identify frequently used keyword information in phishing email threats.


Figure 2. Some of the phishing emails distributed in Korean

3) Case Analysis of Phishing Email Distribution

Representative cases were analyzed according to the format of the attachments (script, document, compress). Through this, users can check the phishing email attack cases that actually occurred this month. In addition to phishing pages (FakePage) from script attachments, XLoader malware using document attachments was distributed through phishing emails this month. When the document file is executed, a C2 that downloads additional malware is present as an internal OLE object. After the malware is downloaded and executed, the XLoader malware is run. Furthermore, there is a growing trend of EXE files being compressed in RAR and being distributed through phishing emails. Additional information such as the C2 address and analysis information, and the body of the phishing email that distributed the malware can be found in the original ATIP report and ATIP Notes.


Figure 3. Malware distributed as an attachment in Document format

 


Figure 4. Malware distributed as an attachment in Compress format

This post shares some of the contents of the November 2025 Phishing Email Trends Report. The full ATIP report includes additional content such as the recent distribution trends of phishing (FakePage) and malware, statistics on the distribution of emails by attachment extension, and analysis information on actual phishing email attacks.

MD5

0b12ea5999c0cc1ef4c1a15fe2634085
18d123267715647f945a57e9c43f9692
1937fb5bd932b6b9ed707d764c567f27
28b61addd4fafba9531dccf1e9aa9f5f
36d69bf3048916cfc12e52d060f6a17d