I Need IT Support Now
AI Phishing
Shane

Hoxhunt 2026 Phishing Trends Report: A 14x AI Phishing Surge Hit Over the Holidays

50 Million Data Points Reveal How Phishing Training Reduces Organizational Risk – Calendar Invites Are The New Phishing Trap With 4x Higher Click Rates

Phishing Trends Report 2026: What Houston Businesses Need to Know About the AI Phishing Surge
Cybersecurity Report

Hoxhunt 2026 Phishing Trends Report: A 14x AI Phishing Surge Hit Over the Holidays

50 million data points. 4 million users. One alarming conclusion: AI phishing just went from trickle to flood.

TL;DR
Hoxhunt's 2026 Phishing Trends Report reveals AI-generated phishing attacks surged 14x over the 2025 holidays, jumping from 4% to 56% of all reported attacks. Callback phishing grew 500%, malicious SVG files increased fifty-fold, and calendar invite phishing hit 4-6x higher failure rates. The good news: behavior-based training cuts malicious clicks by 87%.

For the first 11 months of 2025, AI-generated phishing was more hype than reality. Hoxhunt's analysis across 4 million users showed that fewer than 5% of phishing attacks reaching inboxes each month showed signs of AI assistance. Security teams had reason to be cautiously optimistic. Then December hit, and the numbers changed fast.

The Hoxhunt 2026 Phishing Trends Report draws on over 50 million phishing simulations and millions of real reported threats across 125 countries. It's the largest dataset of its kind, connecting training simulation outcomes to real-world threat detection. For managed IT providers and the businesses they protect across Houston, Katy, and Sugar Land, the findings carry real urgency.

Key context: Phishing remains the most common breach vector and the most expensive. The IBM Cost of a Data Breach Report 2025 pegged the average phishing breach at $4.88 million, with a $1.2 million cost difference between breaches caught before or after 200 days. Speed matters, and your employees are the ones who determine it.
🤖
The 14x AI Phishing Surge
AI phishing went from background noise to the dominant signal in a single month.

Hoxhunt analysts tracked AI-generated phishing incidence across November, December, and January 2025-2026. The numbers tell a clear story:

4%
AI-generated phishing emails in November 2025
56%
AI-generated phishing emails in December 2025
40%
AI-generated phishing emails in January 2026
14x
Surge in AI phishing over the holiday season

The 4% November figure was consistent with what Hoxhunt had observed throughout most of 2025. The December spike to 56% was, as the report puts it, astonishing. Multiple CISOs confirmed to Hoxhunt that they were hit with an entirely new breed of AI-powered phishing over the holidays. And the trend has held into 2026.

This wasn't supposed to be a surprise. The post-ChatGPT era saw massive increases in malicious messages hitting email filters. It was a matter of time before those attacks started slipping through in volume. What changed is that the trickle became a flood, practically overnight.

The Comcast Business Cybersecurity Threat Report estimates that 80-95% of breaches start with a phishing attack. A Statista survey found that 54% of ransomware infections traced back to phishing, with another 27% tied to poor user practices and 26% to a lack of cybersecurity training.

🔍
What AI-Generated Phishing Actually Looks Like
Polished, templatized, and tougher to spot - but not yet the Skynet-level threat some predicted.

Hoxhunt's analysts were clear: these AI-generated phishing emails are not deepfake video calls or hyper-personalized spear phishing at mass scale. Not yet. What they are is a significant upgrade to the traditional phishing playbook. Better grammar. Cleaner design. More professional presentation. The kind of improvement that turns a quick glance into a click.

The telltale signs Hoxhunt identified in AI-assisted emails include highlighted boxes with thick colored left borders to draw attention to a fake urgency, emojis placed strategically before calls to action (like "📞 Call Support" or "🔒 Secure documents"), rounded corners on buttons and containers, polished grammar throughout, and HTML comments with generic section markers like "Main Content" that large language models commonly produce.

The most common themes broke down like this:

  • Fake offers and promotions (18.6%) - free phones, car emergency kits, airline rewards. The year-end timing made these feel natural.
  • Financial service impersonations (13.1%) - banks, insurance companies, and PayPal, claiming the recipient needed to act on security updates or available benefits.
  • Unpaid invoice lures (8.3%) - impersonated parties ranged from career training consultants to supply chain partners.
  • HR impersonations (8.2%) - performance reviews and salary updates were the most common hooks. These exploit the emotional weight that HR communications naturally carry.

Of the analyzed emails, 43.1% used links, 20.3% used open redirects to mask malicious URLs from both humans and spam filters, 11% used attachments, and 4.9% included a malicious phone number for callback phishing. Urgency was the most commonly exploited emotion, followed by greed and reward-seeking.

One interesting finding: AI-enabled auto-personalization is already common in these campaigns, but it's not very good yet. Failed placeholder text like "##victimdomain##" still shows up in plenty of messages. That will change. The technology is improving.

📞
Callback Phishing: 500% Growth and Counting
Phone numbers don't trigger email filters. Attackers have noticed.

Callback phishing saw a 500% increase in Q4 2025, according to VIPRE Security Group data cited in the report. The concept is simple: instead of embedding a malicious link, the attacker includes a phone number. The email claims something alarming - a fraudulent charge, an expiring subscription, an urgent invoice - and tells the recipient to call to resolve it.

The reason it works is structural. Most email security tools focus on scanning links and attachments. Phone numbers pass right through. Once on the phone, attackers use social engineering to extract credentials, push the target to install remote access software, or authorize fraudulent payments.

Hoxhunt's analysis of callback campaigns from October 2025 through January 2026 found that 27.1% impersonated financial services (PayPal, Venmo, Bank of America), while 26.6% were invoice-themed with fake subscription renewals and bogus order confirmations. LevelBlue's research found that 43% of business email compromise attacks now include a callback phishing element.

⚠️

What This Means for Houston SMBs

Callback phishing bypasses the technical controls most small businesses rely on. Your email filter won't catch a phone number. This is where employee training and a strong cybersecurity program become critical. If your team doesn't know what callback phishing looks like, they're exposed.

Learn how managed IT support protects your team →
📎
Malicious Attachments: PDFs Still Dominate, SVGs Explode
A fifty-fold increase in SVG file attacks, and PDFs aren't going anywhere.

PDFs accounted for 23.7% of all malicious attachments in the first half of 2025, holding their position as the most common malicious file type. They remain popular because they bypass filters more easily and users trust them instinctively. Hoxhunt found these PDFs carrying fake invoices with fraudulent payment details, fake law enforcement letters, and documents with embedded links leading to credential harvesters.

The bigger story is the emergence of SVG files. Malicious SVG attachments increased fifty-fold compared to 2024, climbing to 5% of all malicious attachments - the third most common type. SVG files look like ordinary graphics but can carry embedded scripts that bypass many anti-spam tools. Microsoft moved to block inline SVG image rendering in September 2025, but SVG attachments are still supported, so the technique persists.

Attachment TypeShare of Malicious AttachmentsYear-over-Year Trend
PDF23.7%Steady - remains #1
HTML5.6%Down from 10% in 2024
SVG5.0%Up fifty-fold from 2024
Microsoft Word4.4%Steady
EML1.4%Minor presence

The report also highlighted that roughly 90% of malicious attachments that bypass filters contain deceptive links leading to a further payload - typically a credential harvesting site or malware download. Only about 10% contain further social engineering aimed at deepening engagement before the eventual attack.

📅
Calendar Invite Phishing: 4-6x More Dangerous
A .ics file slips past your guard twice - once in your inbox, again on your calendar.

This one caught Hoxhunt's attention enough that they quickly built simulations around it. Attackers send phishing emails containing .ics calendar invite files. Many email environments automatically add these events to the recipient's calendar when the email arrives. The meeting links or attachments inside the calendar event are malicious.

When Hoxhunt ran simulations using calendar invites, failure rates hit 24% - that's 4 to 6 times higher than the global baseline. The attack works because it exploits routine behavior. You see a new meeting on your calendar, you check the details. It looks legitimate. You click.

There's a compounding problem: reporting the suspicious email doesn't remove the calendar event. Most security tools and reporting buttons target email messages, not calendar objects. So even an employee who correctly identifies and reports the phishing email may still click the malicious calendar event hours or days later when a reminder pops up. For this reason, the calendar event has to be deleted separately.

For businesses that rely on shared calendars and frequent meeting scheduling - which is most of them - this attack vector is particularly dangerous. Teams across law firms, CPA practices, and wealth management firms receive calendar invites constantly and are prime targets for this technique.

🛡️
The Good News: Behavior-Based Training Drastically Cuts Risk
An 87% reduction in malicious clicks. A 6x improvement in threat reporting. The data is clear.

The report's training data is arguably more important than the threat data. It proves that phishing risk is a solvable problem when you approach training the right way.

After organizations adopted a security behavior change program over a traditional quarterly awareness model, Hoxhunt measured these outcomes:

87%
Reduction in malicious clicks
6x
Improvement in threat reporting within 6 months
9x
Rise in simulated threat reporting
10x
Rise in real threat detection

The Verizon DBIR 2025 backs this up: users with recent training reported phishing emails at a 21% rate, compared to a 5% base rate - a fourfold increase. Speed matters too. Hoxhunt's top 5% of reporters flag threats in 39 seconds. And median dwell time drops by a third after training.

The real-world proof is compelling. Within 6 months of training, half of employees have reported at least one real phishing threat. By 12 months, that number reaches two-thirds. Before training, only 34% of users successfully reported simulated malicious attachments while 11% failed by clicking. After 12 months, the success rate climbed to 74% and the failure rate dropped below 2%.

The biggest human cyber risk, as Hoxhunt puts it, is neglecting your humans.

📊
Training Performance by Industry, Department, and Geography
Not all teams respond to training the same way. The data shows exactly where the gaps are.

Hoxhunt broke down training performance across industries, job roles, and countries. The variance is significant, and it matters for how businesses structure their security programs.

🏢
By Industry
Financial services had the highest success rate at 74% after 12 months of training. Healthcare and retail were lowest at 62% and 61% respectively. Hoxhunt attributes this to the nature of those jobs - frontline workers spend less time at computers and more time in intense human interactions, leaving less time for email review and training engagement.
💼
By Job Role
Legal departments had the highest success rate, followed by finance and IT. Communications and business development had the highest failure rates, with communications running 40% higher than finance. Sales, marketing, and business development teams tend to receive more email volume overall, which likely contributes to lower vigilance.
🌍
By Geography
Performance varied significantly by country and continent, shaped by cultural norms around reporting and communication styles. A one-size-fits-all approach, as Hoxhunt's Head of Human Risk put it, fits none.
🎣
By Phishing Theme
Certain attack types consistently fooled more people than others. Invoice scams and authority impersonation attacks generated the highest failure rates, while packet delivery notifications and online service impersonations were easier for trained users to spot.

For Houston-area businesses across construction, manufacturing, and oil and gas, these industry-specific gaps are worth paying attention to. Your training program should account for the types of phishing your people are most likely to encounter - and the types they're most likely to fall for.

💡

Other Key Findings from the Report

Two-thirds of phishing attacks target organizational assets like credentials and financial information, while one-third target personal assets. Microsoft, Docusign, and HR departments are the three most commonly impersonated entities. Gmail accounts for 20% of sender domains in malicious emails. Recruitment scams targeting sales and marketing teams are a growing threat, with attackers impersonating Google, Coca-Cola, and Meta with fake job listings. A cybercrime "supergroup" called The COM - formed by Scattered Spider, LAPSUS$, and ShinyHunters - is pioneering deepfake voice and video phishing for high-value targets.

CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, managed IT support, network security, VoIP, and SD-WAN for businesses with 10-200 employees. Reports like Hoxhunt's 2026 Phishing Trends Report are exactly why we invest heavily in security awareness and threat detection for the businesses we serve across Houston, Katy, Sugar Land, and Cypress.

🔧
How CinchOps Can Help
Phishing risk is a solvable problem when you have the right partner and the right approach.

The Hoxhunt report makes one thing very clear: technology alone won't stop phishing. Your people are both the target and the solution. But most small and mid-sized businesses don't have the resources to build and manage a security training program on their own. That's where a managed IT partner earns its keep.

  • Email Security and Filtering - We deploy and manage advanced email filtering that catches the attacks before they reach your inbox, including the AI-polished phishing that's bypassing standard filters.
  • Security Awareness Training - We implement behavior-based training programs designed to build real threat recognition skills, not just check a compliance box. The Hoxhunt data proves this approach works.
  • Phishing Simulation and Testing - Regular simulated phishing campaigns tailored to the attack types your industry faces most, with measurable improvement tracked over time.
  • Endpoint Protection and Monitoring - When someone does click, your systems need to catch it fast. We monitor endpoints 24/7 to detect and contain threats before they spread.
  • Incident Response Planning - The $1.2 million cost difference between fast and slow breach detection tells the whole story. We build response plans so your team knows exactly what to do.
  • Multi-Factor Authentication and Identity Management - Proper MFA configuration blocks the credential theft that most phishing attacks are ultimately after.

In 30+ years of working in IT, the pattern hasn't changed: the businesses that invest in their people's security skills before an incident are the ones that avoid the worst outcomes. The Hoxhunt data confirms this at a scale of 50 million data points. If your Houston-area business needs help building that kind of resilience, that's exactly what we do.

Frequently Asked Questions

How much did AI-generated phishing increase in late 2025?

According to Hoxhunt's 2026 Phishing Trends Report, AI-generated phishing attacks surged 14x over the 2025 holiday season. Their share of all reported attacks across Hoxhunt's global threat detection network jumped from 4% in November to 56% in December, then settled to 40% in January 2026. This trend has held steady into 2026.

What is callback phishing and why is it growing?

Callback phishing uses fake alerts like invoices, subscription renewals, or security warnings to trick recipients into calling a malicious phone number. It grew 500% in Q4 2025 because phone numbers do not trigger email filtering solutions the way links and attachments do, allowing these messages to bypass technical defenses more easily.

How effective is phishing training at reducing click rates?

Hoxhunt data shows that organizations using behavior-based security training see an 87% reduction in malicious clicks and a 6x improvement in threat reporting within six months. After 12 months, two-thirds of employees have reported at least one real phishing threat. The Verizon DBIR 2025 found that recently trained users report phishing four times more often than untrained ones.

What are the most common AI phishing themes in 2026?

The most common AI-assisted phishing themes identified by Hoxhunt are fake offers and promotions at 18.6%, financial service impersonations at 13.1%, unpaid invoice lures at 8.3%, and HR impersonations at 8.2%. Urgency is the most commonly exploited emotion, followed by greed and reward-seeking behavior.

What new phishing attachment types should businesses watch for?

Malicious SVG files increased fifty-fold from 2024 to 2025, now making up 5% of all malicious attachments. Calendar invite (.ics) files are surging as well, with failure rates 4 to 6 times higher than the phishing baseline. PDF attachments remain the most common malicious file type at 23.7% of all malicious attachments.

100% Free

Know Your Business Security Score

Get a FREE comprehensive security assessment for your Houston area business. Understand vulnerabilities across your network, applications, DNS, and more.

Discover More
Sources

Take Your IT to the Next Level!

Book A Consultation for a Free Managed IT Quote

281-269-6506