Credential phishing isn’t just a threat – it’s exploding. In the second half of 2024, credential phishing attacks surged by 703%, outpacing even the 202% rise in broader email-based phishing threats. Cybercriminals are ramping up their efforts with AI-generated content, fake login pages, and multichannel attack strategies designed to steal credentials and compromise systems.
If your organisation still relies on usernames and passwords, you’re an easy target.
What is Credential Phishing?
Credential phishing is a specific type of cyberattack where bad actors trick users into handing over login credentials – typically through fake emails, login pages, or texts that appear to come from trusted sources like your bank, IT team, or a known vendor. Once they have access, attackers can:
✔️ Steal data
✔️ Plant malware
✔️ Launch Business Email Compromise (BEC) scams
✔️ Move laterally across systems undetected
And with the rise of AI-powered phishing, these attacks are more sophisticated – and harder to spot – than ever.


How Credential Phishing Has Evolved
- 1990s-2000s: Early attacks mimicked ISPs and banking websites
- 2010s: Spear phishing and BEC took center stage, targeting specific people with highly tailored messages
- 2020s: Now attackers use generative AI to create realistic messages in minutes – and are launching phishing campaigns across email, SMS, Slack, Teams, and even phone calls
Common Tactics to Watch out for
Attackers are constantly evolving, but these are the core tactics you need to defend against:
✔️ Deceptive emails that impersonate trusted contacts and create urgency
✔️ Fake login pages crafted to match your org’s branding
✔️ Smishing, vishing, and phishing via collaboration tools
✔️ QR code phishing that bypasses link scanning tools
✔️ Credential stuffing – using stolen credentials across multiple services
✔️ Password spraying with common passwords to exploit weak hygiene
✔️ Precision-validating phishing that checks credentials in real time to boost attack efficiency
How to Defend Against Credential Phishing
The good news? You can stay one step ahead with the right tools and strategies.
You Stay Legal & Compliant
We help you meet:
✔️ Electricity at Work Regulations: All workplace electrics must be safe
✔️ BS 7671: The UK’s national wiring standard
✔️ Building Regulations Part P: Covers certain business electrical work
Your Workplace Stays Safe
Reduce the risk of:
✔️ Dangerous wiring or fire hazards
✔️ Power outages from poor installations
✔️ Electrical shocks or injuries
Centralise Access with SSO
RSA simplifies access with login for all tools – reducing your attack surface from zones of logins to just one.
Deploy Device-Bound Passkeys
RSA enables phishing-resistant login via device-bound passkeys, which are:
✔️ Never reused
✔️ Immune to fake login pages
✔️ Easy to deploy across IT environments
Build a Zero Trust Framework
RSA helps organisations adopt Zero Trust by securing identity and access through:
✔️ Role and attribute based access controls
✔️ Risk-based policies
✔️ Continuous verification at every access point
Use AI to Detect and Block Phishing
RSA is using AI the right way – to stop phishing before it causes damage:
✔️ RSA detects abnormal login behaviour and takeover attempts
✔️ RSA flags risky access requests before they’re approved
What’s Next for Credential Phishing?
Expect credential phishing to get even smarter – leveraging deepfakes, advanced social engineering, and more automation. But as threat actors evolve, so do defenders.
According to the 2025 RSA ID IQ Report:
✔️ 80% of security leaders believe AI will help strengthen cybersecurity
✔️ Only 20% believe AI will benefit attackers more than defenders

DTE and RSA can help
RSA delivers passwordless authentication, phishing-resistant MFA, SSO, and AI=powered identity security – all designed to help organisations like yours:
✔️ Stop credential-based attacks
✔️ Strengthen access controls
✔️ Simplify authentication
✔️ Build toward a Zero Trust future
Let’s make credential phishing a thing of the past. Get in touch to find out more how we can help your organisation.