Insight, News, Security

Email-Based Attacks Dominated the Threat Landscape in 2021

Dubai, UAE, February 22, 2022: Proofpoint, Inc., a leading cybersecurity and compliance company, today released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness, vulnerability, and resilience. The report reveals that attackers were more active in 2021 than 2020, with findings uncovering that more than three-quarters (78%) of organisations saw email-based ransomware attacks in 2021, while 77% faced business email compromise attacks (BEC) (18% YoY increase of BEC attacks from 2020), reflecting cybercriminals’ continued focus on compromising people, as opposed to gaining access to systems through technical vulnerabilities.

Attacks in 2021 also had a much wider impact than in 2020, with 83% of survey respondents revealing their organisation experienced at least one successful email-based phishing attack, up from 57% in 2020. In line with this, more than two-thirds (68%) of organisations said they dealt with at least one ransomware infection stemming from a direct email payload, second-stage malware delivery, or other exploit. The year-over-year increase remains steady but representative of the challenges organisations faced as ransomware attacks surged in 2021.

“Where 2020 taught us about the need to be agile and responsive in the face of change, 2021 taught us about the need to better protect ourselves”, said Alan Lefort, SVP and GM of Security Awareness Training for Proofpoint. “As email remains the favored attack method for cyber criminals, there is clear value in building a culture of security. In this evolving threat landscape and as work-from-anywhere becomes commonplace, it is critical that organisations empower their people and support their efforts to learn and apply new cyber skills, both at work and at home”.

The shift to hybrid working accelerated in 2021, with 81% of organisations saying that more than half of their employees are working remotely (either part or full time) due to the pandemic. However, only 37% educate workers about best practices for remote working, illustrating a worrying gap in security best practice knowledge for the “new normal” of working. For example, 97% of workers said they have a home Wi-Fi network, but only 60% said their network is password-protected, a major lapse in basic security hygiene.

Emile Abou Saleh, Regional Director, Middle East and Africa for Proofpoint.

“As partial work from home continues for many organisations across the Middle East, it is important for people to understand how to spot and report attempted cyberattacks.  The way to do this is through effective security awareness training which focuses on the issues and behaviours that matter most to an organisation’s mission”, said Emile Abou Saleh, Regional Director, Middle East and Africa for Proofpoint. “We recommend taking a people-centric approach to cybersecurity by blending organisation-wide awareness training initiatives with targeted, threat-driven education. The goal is to empower users to recognise and report attacks”.

“Infosec and IT survey participants experienced an increase in targeted attacks in 2021 compared to 2020, yet our analysis showed the recognition of key security terminology such as phishing, malware, smishing, and vishing dropped significantly”, said Lefort. “The awareness gaps and lax security behaviours demonstrated by workers creates substantial risk for organisations and their bottom line. Our 2022 report offers actionable advice aimed at enhancing user awareness, reducing risk, and protecting people”.

Additional State of the Phish report global findings include the following key takeaways:

  • Almost 60% of those infected with ransomware paid a ransom. Many (32%) paid additional ransom sums to regain access to data and systems. 54% regained access to data/systems after the first payment, while 4% never got access to data/systems, even after paying. 10% refused to pay additional ransom demand(s) and walked away without data.
  • Many workers exhibit risky behaviours and fail to follow cybersecurity best practices. 42% said they took a dangerous action (clicked a malicious link, downloaded malware, or exposed their personal data or login credentials) in 2021. And 56% of people who have access to an employer-issued device (laptop, smartphone, tablet, etc.) allowed friends and family to use those devices to do things like play games, stream media, and shop online.
  • Awareness of key security terminology dropped (in some cases, significantly) year-over-year. Only 53% of respondents were able to correctly identify the definition of the term ‘phishing’ in a multiple-choice array. This was down from last year’s 63% mark, a 16% year-over-year decrease. Only 63% recognised the definition of malware (down from 65% in 2020), just 23% identified the definition of smishing (down from 31% in 2020), and only 24% recognized the definition of vishing (down from 30% in 2020). Ransomware was the only term that saw a global increase in recognition, with correct answers rising from 33% in 2020 to 36% 2021.
  • Proofpoint customers saw positive results in awareness and security behaviors, even with more testing and a more active threat climate. Our customers’ average failure rate on phishing simulations held steady at 11% year over year, even with the 50% increase in testing seen over our 12-month measurement period.
  • Employees were able to better report suspicious emails they receive in their inboxes. Over our one-year measurement period, users alerted their security teams to more than 350,000 credential phishing emails, nearly 40,000 emails with malware payloads, and more than 20,000 malicious spam emails.

To download the State of the Phish 2022 report, and see a full list of global and regional comparisons, please visit: For more information on cybersecurity awareness best practices and training, please visit:

Previous ArticleNext Article


The free newsletter covering the top industry headlines