During the COVID-19 pandemic, phishing campaigns increased significantly, often impersonating government relief programs and financial institutions.
The Pandemic Phishing Surge As governments distributed economic relief funds, cybercriminals exploited urgency through phishing emails designed to steal credentials or financial information. The Federal Trade Commission (https://www.ftc.gov/) and FBI (https://www.fbi.gov/) both reported increased phishing and impersonation scams during the pandemic, particularly those linked to stimulus payments and unemployment benefits.
What the Data Actually Supports Cybersecurity reporting shows broader trends:
- Phishing and email-based attacks increased significantly during 2020–2021 according to the Verizon Data Breach Investigations Report (https://www.verizon.com/business/resources/reports/dbir/)
- Spam made up a large share of global email traffic, but spam is not the same as phishing, which is more targeted and malicious
- Financial losses from phishing are reported in the hundreds of millions to billions annually across all cybercrime categories (FTC reporting: https://www.ftc.gov/reports)
Click Rates and User Vulnerability Phishing effectiveness varies widely depending on targeting:
- General phishing campaigns typically have low success rates in broad email distribution
- Spear phishing campaigns are significantly more effective due to personalization and trust exploitation
- The Verizon DBIR consistently identifies human interaction as a primary breach vector (https://www.verizon.com/business/resources/reports/dbir/)
Why Phishing Worked During the Pandemic
Phishing effectiveness increased due to real-world conditions:
- Increased reliance on digital communication during lockdowns
- Financial urgency around stimulus payments
- Overloaded IT and government support systems
- Higher exposure to unfamiliar government-related digital communications The ENISA notes that crisis periods significantly increase susceptibility to phishing due to emotional pressure and reduced verification behavior (https://www.enisa.europa.eu/).
Common Attack Style in 2021 Phishing campaigns often included:
- Fake government or stimulus payment emails
- Lookalike domains impersonating official agencies
- Urgent requests for login verification or banking details
- Credential-harvesting pages designed to mimic official portals