60+ Social Engineering Statistics [Updated 2025]
In the world of cybersecurity, the greatest threat isn't always a rogue piece of code or a system bug. It’s something much harder to remediate – the human element.
Unlike traditional cyber threats that seek to exploit system vulnerabilities, social engineering attacks bypass technical defenses by manipulating people into revealing confidential information or making security mistakes.
That's why understanding social engineering is so vital. It's not just about implementing the latest security controls; it's about recognizing the human vulnerabilities within our organizations and learning how to fortify them.
So let's delve deeper into the world of social engineering, understand the extent of the threat it poses with the latest social engineering statistics, and explore how organizations can guard against this formidable threat.
Recommended reading
The 13 Most Common Types of Social Engineering Attacks + How to Defend Against Them
Malware and ransomware statistics
1. 59% of organizations globally experienced a ransomware attack in 2024. (Statista)
2. Ransomware payments surged to a record high of $460 million in the first half of 2024. (Chainalysis)
3. 2024 saw the largest ransomware payment ever recorded — approximately $75 million paid to the Dark Angels ransomware group. (Chainalysis)
4. The median loss associated with ransomware and other extortion breaches was $46,000 in 2024. (Verizon)
5. The median ransom payment jumped from just under $200,000 in early 2023 to $1.5 million in mid-June 2024. (Chainalysis)
6. After experiencing a ransomware attack, roughly 46% of organizations worldwide paid a ransom to get their encrypted data back. (Statista)
7. 97% of companies were able to retrieve their data after a ransomware attack in 2023, with 70% relying on data backups. (Statista)
8. Roughly one-third of breaches (32%) in 2024 involved ransomware or another extortion technique. (Verizon)
9. 16.3% of ransomware victims paid the ransom to recover their data in 2024, compared to just 6.9% in 2023. (HornetSecurity)
10. 14% of ransomware victims reported their backup storage was also affected during the attack, either encrypted or rendered inaccessible. (HornetSecurity)
11. Over half of all ransomware incidents in 2024 originated from email and phishing attacks. (HornetSecurity)
12. Small organizations remain the most vulnerable to ransomware, with 55.8% of attacks targeting companies with 1-50 employees. (HornetSecurity)
13. Of the small businesses that were targeted by ransomware, 1 in 5 ended up paying the ransom to recover their data. Among those who did, 60% paid between $10,000 and $100,000 in ransom. (HornetSecurity)
14. Nearly 1 in 10 organizations do not know how their systems were infiltrated by ransomware, and 1 in 3 ransomware victims are unaware if any data was exfiltrated. (HornetSecurity)
15. 81% of organizations say they train their employees to recognize and flag potential ransomware attacks. (HornetSecurity)
16. 67% of IT professionals say the rise of generative AI has increased their fear of being targeted by a ransomware attack. (HornetSecurity)
17. 55% of organizations have purchased ransomware insurance policies. (HornetSecurity)
18. 40% of ransomware incidents involve the use of desktop sharing software and 35% involve the use of email. (Verizon)
19. Ransomware is currently considered the top cybersecurity concern for organizations, with over half of surveyed companies ranking it as their primary threat in 2024. (Arctic Wolf)
20. The healthcare, financial services, and information technology sectors are the most likely sectors to experience a ransomware attack. (FBI)
21. Ransomware breaches take an average of 326 days to contain — 49 days longer than the average data breach. (IBM)
22. The average cost of a ransomware attack — not including the cost of the ransom itself — is $4.54 million. (IBM)
23. The average cost of a ransomware breach is 13.1% higher for organizations that don’t pay the ransom. (IBM)
24. Email is the most common malware delivery method. (Verizon)
25. 450,000 new pieces of malware are registered by the AV-Test Institute every day. (AV-Test)
26. Experts estimate a ransomware attack on businesses occurs every 11 seconds. (Cybercrime Magazine)
Phishing statistics
27. 94% of businesses are reported to have experienced a phishing attack in 2024, with most of them experiencing negative impacts from these attacks. (Egress)
28. The median time for users to fall for phishing emails is less 60 seconds. (Verizon)
29. The median time to click on a malicious link after the email is opened is 21 seconds, and then it takes only another 28 seconds to enter the data. (Verizon)
30. Phishing and pretexting via email account for 73% of all breaches. (Verizon)
31. An average 2.9% of employees click on phishing emails. (Verizon)
32. Phishing schemes were the number one crime type with 300,497 complaints. (FBI)
33. The average CEO receives 57 targeted phishing attacks every year. (Barracuda)
34. 43% of phishing attacks impersonate Microsoft brands. (Barracuda)
35. IT staff receive an average of 40 targeted phishing attacks every year. (Barracuda)
36. 95% of successful network intrusions rely on spear phishing techniques. (Security Intelligence)
37. Phishing impersonation attacks, where attackers pose as emails from a well-known brand or service to trick victims into clicking on a phishing link, make up 49% of all socially engineered threats. (Barracuda)
38. Only half of employees are able to correctly define spear phishing. (Proof Point)
39. 62% of organizations use a security awareness training program to reduce the likelihood of a successful phishing attack. (Arctic Wolf)
40. Phishing is the second most common cause of a breach and the costliest, with an average $4.91 million in breach costs. (IBM)
41. Most imitated brands in phishing attacks: Zscaler and Barracuda
-Microsoft
-WeTransfer
-DHL
-Google
-eFax
-DocuSign
-USPS
-Dropbox
-Xerox
-Facebook
-Amazon
-OneDrive
-PayPal
-Roblox
-WhatsApp
-Microsoft 365
-Adobe
-Fidelity
Business email compromise statistics
42. Business Email Compromise (BEC) accounts for 24-25% of financially motivated attacks. (Verizon)
43. 1 in 10 social engineering attacks are business email compromise (BEC) attacks. (Barracuda)
44. 77% of BEC attacks target employees outside of finance and executive roles. 1 in 5 BEC attacks target sales employees. (Barracuda)
45. Business email compromise (BEC) attacks account for 6% of all breaches with an average cost of $4.89 million. (IBM)
Protect against social engineers and cybercriminals with Secureframe Train
Our security and compliance automation platform includes proprietary security awareness training, making it easy to assign, track, and report on required employee training. Our engaging training programs are kept up-to-date, so the latest best practices are learned and applied throughout your organization. You can also segment your workforce and assign just the training required for each group or role.
Learn more about Secureframe Training, or schedule a demo with a product expert.
Use trust to accelerate growth
FAQs
What percentage of attacks are social engineering?
Social engineering accounts for approximately 70-90% of cyberattacks, with phishing being the most prevalent method.
What are the most common social engineering attacks?
The most common social engineering attacks include phishing, spear phishing, pretexting, baiting, and tailgating.
Which category of social engineering is the most common?
Phishing is the most common category, as it is widely used to trick individuals into providing sensitive information or downloading malware.
Is social engineering increasing?
Yes, social engineering attacks are increasing, fueled by the widespread use of digital communication platforms and attackers' evolving tactics.
What is the best defense against social engineering attacks?
The best defense includes employee training, multi-factor authentication (MFA), email filtering tools, and clear security policies.
How much money is lost due to social engineering?
The average cost of a social engineering attack is $130,000.
What are social engineering attacks?
Social engineering is a method used by cybercriminals that involves tricking people into sharing confidential information such as passwords and credit card numbers, or access to their computer systems where they install malicious software. Instead of breaking into a system directly, social engineers manipulate people into making security mistakes or giving away sensitive information.
The trust we place in others, our desire to be helpful, and even our fears are all vulnerabilities that cybercriminals eagerly exploit. They don't need advanced hacking skills if they can simply trick an employee into clicking a malicious link or revealing a password.
Social engineering is among the most common types of cyberattacks used by bad actors to exploit an organization — and attacks are growing more sophisticated. Social engineers are using increasingly personalized tactics to gain trust and avoid suspicion. Voice cloning and deepfake technology make it possible for threat actors to impersonate their targets in even more convincing ways. In one high-profile instance, the AI-created voice of a bank director was used to trick a bank manager into transferring $35 million to threat actors.
Social engineering attacks are an especially dangerous threat to organizations specifically because of the human element. Mistakes made by legitimate users are more difficult to detect, predict, and remediate. In many cases, victims don’t even realize they’ve been tricked.
Most common types of social engineering attacks