2021's Phishing Landscape Is Unlike Anything We've Seen Before
In March, Microsoft reported that a massive phishing campaign had targeted over 10,000 organizations since January 2021, using sophisticated OAuth token theft to bypass multi-factor authentication. That single campaign should have been a wake-up call. Instead, it was just one headline in a relentless stream of phishing news that has defined the first half of this year.
If you're responsible for security at your organization — or just trying to keep your own credentials safe — this post breaks down the biggest phishing stories of 2021 so far, what they mean for you, and the specific steps that actually reduce your risk. This isn't a recap for the sake of it. Every incident here carries a lesson you can act on today.
The Colonial Pipeline Attack Started with a Single Password
You already know about the Colonial Pipeline ransomware attack in May 2021. It shut down fuel delivery across the U.S. East Coast for days, triggered panic buying, and resulted in a $4.4 million ransom payment. What got less attention in the initial coverage was how the attackers got in.
According to reporting from Bloomberg, the initial access came through a compromised VPN account — a single set of credentials that lacked multi-factor authentication. While the exact method of credential theft hasn't been publicly confirmed as phishing, the pattern is one I've seen hundreds of times: credential theft is the doorway, and phishing is the most common key.
The Verizon 2021 Data Breach Investigations Report confirmed what many of us suspected: 36% of all data breaches in the past year involved phishing, up from 25% the year before. That's not a trend. That's an explosion. You can read the full report at Verizon's DBIR page.
Why Credential Theft Keeps Winning
Threat actors don't need zero-day exploits when they can just ask for your password. Phishing emails that impersonate Microsoft 365 login pages, VPN portals, or HR systems are cheap to create and devastatingly effective. In my experience working with mid-size organizations, at least 15-20% of employees will click a well-crafted phishing link in a simulation — and that's in companies that have done some training.
If your organization hasn't run a phishing awareness training program with realistic simulations, you're operating blind. You don't know your actual click rate, and you can't improve what you don't measure.
COVID-19 Vaccine Phishing Scams Flooded Inboxes
The FBI's Internet Crime Complaint Center (IC3) issued multiple alerts in early 2021 about phishing schemes exploiting COVID-19 vaccine distribution. Attackers sent emails impersonating health agencies, employers, and pharmacies, luring victims to fake scheduling portals designed to harvest personal information and credentials.
The FBI's IC3 received over 791,000 complaints in 2020 — the highest ever recorded — with reported losses exceeding $4.2 billion. The 2021 numbers are tracking even higher, largely driven by phishing and social engineering. You can review their annual reports at ic3.gov.
Here's what made the vaccine phishing campaigns so effective: urgency and authority. People were desperate for appointments. An email saying "Your vaccine appointment is ready — confirm now" hit every psychological trigger a social engineering attack needs.
The Anatomy of a Vaccine Phishing Email
I analyzed dozens of these during Q1 2021. The common elements were:
- Sender addresses that closely mimicked legitimate health departments (e.g., "[email protected]" instead of cdc.gov)
- Professional formatting with correct logos and color schemes
- Links to convincing login pages that harvested email credentials
- Urgency language: "Your slot expires in 24 hours"
Your employees saw these in their personal inboxes. Many of them also saw similar lures in their work email. The line between personal phishing and corporate data breach is paper-thin.
What Is Phishing News Telling Us About 2021's Threat Landscape?
Phishing news in 2021 reveals three unmistakable patterns. First, threat actors are exploiting current events faster than ever. The gap between a news headline and a phishing campaign using that headline has shrunk to hours, not days. Second, phishing is the primary initial access vector for ransomware — the attack type dominating every CISO's threat briefing right now. Third, the attacks are getting harder to detect visually.
Gone are the days of obvious misspellings and Nigerian prince tropes. Modern phishing emails use pixel-perfect branding, legitimate-seeming domains, and highly personalized content pulled from LinkedIn profiles and company websites. Security awareness training that still uses outdated examples is worse than useless — it gives employees false confidence.
The Microsoft 365 Phishing Epidemic
Microsoft 365 has become the single most impersonated platform in phishing attacks. That's not surprising — it's the dominant business productivity suite globally, and a compromised M365 account gives attackers access to email, SharePoint, OneDrive, and Teams.
In February 2021, researchers at Cofense reported a 45% increase in Microsoft-themed phishing emails compared to the previous year. These attacks typically redirect users to convincing replica login pages that capture credentials in real time and can even relay MFA tokens using adversary-in-the-middle techniques.
I've personally investigated incidents where a single compromised M365 account was used to send phishing emails to every contact in the victim's address book — including clients, vendors, and executives. The trust factor is devastating. When the phishing email comes from a real colleague's actual email address, click rates skyrocket.
Practical Defenses That Actually Work
Here's what I recommend to every organization I work with:
- Deploy conditional access policies. Restrict M365 logins by geography, device compliance, and risk level.
- Enforce hardware-based MFA. SMS codes can be intercepted. FIDO2 security keys or app-based push notifications with number matching are far more resistant to phishing.
- Run continuous phishing simulations. Not once a year. Monthly. Vary the templates. Measure who clicks, who reports, and who ignores. A strong phishing simulation program is your most honest risk assessment.
- Enable mailbox auditing and alert on impossible travel. If an account logs in from Ohio and then Nigeria 20 minutes later, your security team should know immediately.
Business Email Compromise Is Phishing's Most Expensive Cousin
The FBI IC3 has consistently ranked Business Email Compromise (BEC) as the costliest cybercrime category. In 2020, BEC accounted for over $1.8 billion in reported losses — dwarfing ransomware. BEC starts with phishing. An attacker compromises an executive's email (often through a credential phishing attack), monitors conversations, and then inserts themselves into a financial transaction.
In June 2021, the Department of Justice announced the arrests of 65 individuals involved in BEC schemes that collectively stole over $51 million. These weren't sophisticated nation-state hackers. They were organized criminals using phishing as their entry point and patience as their weapon.
Your finance team is the last line of defense against BEC. They need to verify wire transfer changes by phone — using a number they already have on file, not the one in the email. This isn't a technology solution. It's a human process, and it requires training.
Zero Trust: The Architecture Behind the Buzzword
You've probably heard "zero trust" mentioned in every phishing news article and vendor pitch this year. CISA has been actively promoting zero trust architecture as a foundational approach to federal cybersecurity, and the May 2021 Executive Order on Improving the Nation's Cybersecurity explicitly called for it. You can read CISA's zero trust guidance at cisa.gov.
Here's what zero trust actually means for phishing defense: assume every login attempt is potentially compromised. Verify continuously. Don't grant broad access based on a single authentication event. Segment your network so that a compromised credential doesn't give an attacker the keys to everything.
Zero trust doesn't eliminate phishing. Nothing does. But it dramatically limits the blast radius when — not if — someone clicks.
What Your Organization Should Do This Week
I'm not going to tell you phishing is a growing problem and leave it there. Here are five actions you can take before Friday:
- Check your MFA coverage. Audit every externally accessible service — VPN, email, cloud apps. If any of them allow password-only authentication, fix that first.
- Send a phishing simulation. Use a realistic template based on current events. Measure the results. Share them with leadership — not to shame anyone, but to justify budget.
- Review your email filtering rules. Are you blocking known malicious domains? Are you flagging external emails with a visible banner? Small changes make a measurable difference.
- Train your people with real examples. Generic "don't click suspicious links" advice accomplishes nothing. Show them the actual phishing emails targeting your industry right now. Our cybersecurity awareness training platform uses current, real-world scenarios for exactly this reason.
- Establish a reporting culture. Employees who report phishing attempts should be praised, not ignored. Make reporting easy — a one-click button in the email client — and respond to every report.
The $4.88M Lesson Most Organizations Learn Too Late
IBM's 2021 Cost of a Data Breach Report pegged the global average cost of a data breach at $4.24 million — an all-time high. Breaches where phishing was the initial attack vector were among the most expensive. For U.S. companies specifically, the average was even higher: $9.05 million.
These aren't theoretical numbers. They include forensic investigation, legal fees, regulatory fines, customer notification, credit monitoring, lost business, and reputational damage. I've watched small businesses close their doors after a single successful phishing attack led to a ransomware deployment that encrypted everything — including their backups.
The math is straightforward. A comprehensive security awareness program costs a fraction of a single incident. Phishing simulations, ongoing training, and a culture of vigilance are the cheapest insurance your organization can buy.
Staying Ahead of the Next Wave
The second half of 2021 will bring more of what we've seen: phishing campaigns exploiting current events, credential theft feeding ransomware operations, and BEC schemes targeting your finance department. The threat actors aren't slowing down because they don't need to — phishing still works.
Your best defense is a workforce that recognizes the threat, reports suspicious messages reflexively, and operates within systems designed to limit damage when someone inevitably makes a mistake. Start with phishing awareness training built on realistic simulations, layer on technical controls like MFA and conditional access, and commit to treating security as an ongoing practice rather than an annual checkbox.
The phishing news cycle isn't going to slow down. But your organization's appearance in it is entirely preventable.