New Proofpoint Report Reveals Sharp Rise in URL-Based Threats, 400% Spike in ClickFix Malware Campaigns and 4.2M QR Code Attacks
(MENAFN- BPG Group) Dubai, United Arab Emirates, August 19, 2025 - Proofpoint, a leading cybersecurity and compliance company, today released the second volume of its Human Factor 2025 Report series, which reveals a sharp escalation in phishing and URL-based threats. Drawing on data from Proofpoint’s threat intelligence platform, the report outlines how cybercriminals are using advanced social engineering and AI-generated content to make malicious URLs increasingly difficult for users to identify.
Whether through email, text messages, or collaboration apps, URL-based threats now dominate the cyber threat landscape. Attackers are not just impersonating trusted brands - they are abusing legitimate services, tricking users with fake error prompts, and bypassing traditional security by embedding threats in QR codes and SMS messages.
Key findings from the report include:
• Malicious URLs are now the preferred delivery mechanism - used four times more than attachments in email threats: Cybercriminals increasingly favor URLs over attachments, as they are easier to disguise and more likely to evade detection. These links are embedded in messages, buttons, and even inside attachments like PDFs or Word documents to entice clicks that initiate credential phishing or malware downloads.
• ClickFix malware campaigns increased nearly 400% year-over-year: ClickFix is a phishing technique that lures users into running malicious code by displaying fake error messages or CAPTCHA screens. By exploiting the urge to resolve a perceived technical issue, this method has quickly become a go-to tactic for malware operators, helping them spread remote access trojans (RATs), infostealers, and loaders.
• Proofpoint identified over 4.2 million QR code phishing threats in the first half of 2025 alone: QR code-based attacks remove users from enterprise protections by leveraging personal mobile devices. Once scanned, these codes redirect users to phishing sites designed to harvest sensitive information such as credentials, credit card data, or personal identifiers, all under the guise of legitimacy.
• Credential phishing remains the most prevalent goal for attackers, with 3.7 billion URL-based attacks aimed at stealing logins: Attackers are overwhelmingly focused on stealing login credentials rather than distributing malware. With phishing lures that impersonate trusted brands and use off-the-shelf tools such as CoGUI and Darcula phish kits, even low-skilled actors can deploy highly convincing campaigns that bypass multifactor authentication and lead to full account takeover.
• Smishing campaigns jumped 2,534% as attackers shift focus to mobile devices: At least 55% of suspected SMS-based phishing messages (smishing) analyzed by Proofpoint contained malicious URLs. These often mimic government communications or delivery services and are highly effective due to the immediacy and trust users place in mobile text messages, reflecting a shift toward mobile-first targeting by threat actors.
“The most damaging cyber threats today don’t target machines or systems. They target people. In addition, URL-based phishing threats are no longer confined to the inbox, they can be carried out anywhere and are often extremely difficult for people to identify,” said Matt Cooke, Cybersecurity Strategist at Proofpoint. “From QR codes in emails and fake CAPTCHA pages to mobile-first smishing scams, attackers are weaponizing trusted platforms and familiar experiences to exploit human psychology. Defending against these threats requires multilayered, AI-powered detection and a human-centric security strategy.”
Whether through email, text messages, or collaboration apps, URL-based threats now dominate the cyber threat landscape. Attackers are not just impersonating trusted brands - they are abusing legitimate services, tricking users with fake error prompts, and bypassing traditional security by embedding threats in QR codes and SMS messages.
Key findings from the report include:
• Malicious URLs are now the preferred delivery mechanism - used four times more than attachments in email threats: Cybercriminals increasingly favor URLs over attachments, as they are easier to disguise and more likely to evade detection. These links are embedded in messages, buttons, and even inside attachments like PDFs or Word documents to entice clicks that initiate credential phishing or malware downloads.
• ClickFix malware campaigns increased nearly 400% year-over-year: ClickFix is a phishing technique that lures users into running malicious code by displaying fake error messages or CAPTCHA screens. By exploiting the urge to resolve a perceived technical issue, this method has quickly become a go-to tactic for malware operators, helping them spread remote access trojans (RATs), infostealers, and loaders.
• Proofpoint identified over 4.2 million QR code phishing threats in the first half of 2025 alone: QR code-based attacks remove users from enterprise protections by leveraging personal mobile devices. Once scanned, these codes redirect users to phishing sites designed to harvest sensitive information such as credentials, credit card data, or personal identifiers, all under the guise of legitimacy.
• Credential phishing remains the most prevalent goal for attackers, with 3.7 billion URL-based attacks aimed at stealing logins: Attackers are overwhelmingly focused on stealing login credentials rather than distributing malware. With phishing lures that impersonate trusted brands and use off-the-shelf tools such as CoGUI and Darcula phish kits, even low-skilled actors can deploy highly convincing campaigns that bypass multifactor authentication and lead to full account takeover.
• Smishing campaigns jumped 2,534% as attackers shift focus to mobile devices: At least 55% of suspected SMS-based phishing messages (smishing) analyzed by Proofpoint contained malicious URLs. These often mimic government communications or delivery services and are highly effective due to the immediacy and trust users place in mobile text messages, reflecting a shift toward mobile-first targeting by threat actors.
“The most damaging cyber threats today don’t target machines or systems. They target people. In addition, URL-based phishing threats are no longer confined to the inbox, they can be carried out anywhere and are often extremely difficult for people to identify,” said Matt Cooke, Cybersecurity Strategist at Proofpoint. “From QR codes in emails and fake CAPTCHA pages to mobile-first smishing scams, attackers are weaponizing trusted platforms and familiar experiences to exploit human psychology. Defending against these threats requires multilayered, AI-powered detection and a human-centric security strategy.”
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Most popular stories
Market Research

- BILLY 'The Mascot Of BASE' Is Now Trading Live On BASE Chain
- Primexbt Launches Empowering Traders To Succeed Campaign, Leading A New Era Of Trading
- Ecosync & Carboncore Launch Full Stages Refi Infrastructure Linking Carbon Credits With Web3
- Japan Buy Now Pay Later Market Size To Surpass USD 145.5 Billion By 2033 CAGR Of 22.23%
- Daytrading Publishes New Study On The Dangers Of AI Tools Used By Traders
- House Of Doge And Bitstamp By Robinhood Announce Strategic Partnership For NYSE:ZONE Treasury
Comments
No comment