The Most Common Phishing Scams in 2026 (and How to Avoid Them)
The Most Common Phishing Scams in 2026 (and How to Avoid Them)
From deepfake voice calls to AI-crafted emails, these are the phishing scams dominating 2026. Learn how each one works and exactly how to protect yourself.
How Phishing Has Evolved
Phishing in 2026 barely resembles the crude attempts of a decade ago. The industry has professionalized. Phishing-as-a-Service (PhaaS) platforms sell ready-made phishing kits with polished templates, hosting infrastructure, and credential harvesting backends. AI tools generate convincing, personalized messages at scale. And the attack surface has expanded far beyond email โ encompassing text messages, voice calls, QR codes, social media, and even video conferencing.
According to the FBI's Internet Crime Complaint Center (IC3), phishing and related social engineering caused over $12.5 billion in losses globally in recent years, with business email compromise alone accounting for billions. These aren't just attacks on individuals โ entire companies are brought down by a single successful phishing message.
What follows are the most prevalent and dangerous phishing scams active in 2026, along with specific countermeasures for each.
Credential Harvesting Emails
The classic and still most common phishing type: an email that directs you to a fake login page designed to steal your username and password.
How it works in 2026:
- You receive an email that appears to be from a trusted service (Microsoft 365, Google Workspace, your bank, a streaming service)
- The email claims there's a problem โ suspicious login, expired password, disabled features, billing issue
- You click the link and arrive at a page that looks identical to the real login page
- You enter your credentials, which are captured by the attacker
- The fake page may redirect you to the real site afterwards, so you never realize you were phished
- The attacker now has your credentials and may immediately log into your account
Modern sophistication:
- Adversary-in-the-middle (AitM) attacks intercept and relay your login in real-time, capturing session cookies that bypass even 2FA. Tools like EvilProxy and Evilginx make these attacks accessible to less sophisticated attackers.
- Reverse proxy phishing kits create a real-time proxy between you and the legitimate site. You see and interact with the real site, but the attacker intercepts everything โ including 2FA codes and session tokens.
- Pixel-perfect replicas created from the actual website source code, complete with correct fonts, animations, and responsive design.
How to protect yourself:
- Use a password manager. It won't autofill credentials on a phishing domain because it matches URLs exactly. If your password manager doesn't offer to fill in your credentials, the site is likely fake.
- Use phishing-resistant 2FA. Hardware security keys (FIDO2/WebAuthn) verify the domain before authenticating. They will not authenticate to a phishing site โ period. This defeats even AitM attacks.
- Check the URL carefully before entering any credentials. Ensure you're on the exact correct domain.
Business Email Compromise (BEC)
Business Email Compromise is the most financially damaging form of phishing. The FBI reports that BEC has caused losses exceeding $50 billion globally since 2013.
How it works:
- Attackers research a company โ identifying executives, financial staff, and vendors through LinkedIn, company websites, and social media
- They compromise or spoof a trusted email address (CEO, CFO, vendor, client)
- They send a carefully crafted email to an employee who handles finances
- The email requests a wire transfer, invoice payment, or purchase (often gift cards)
- Because the request appears to come from authority, the employee complies
Common BEC scenarios:
- CEO fraud: "I need you to wire $50,000 to this account immediately. I'm in a meeting and can't talk, but it's urgent. Keep this confidential." Sent from what appears to be the CEO's email to someone in finance.
- Vendor impersonation: An email from a company's real vendor (or a spoofed version) says their bank details have changed. All future payments should go to the new account โ which is controlled by the attacker.
- Attorney impersonation: "I'm the attorney handling the acquisition. We need a wire transfer today for the escrow deposit. This is time-sensitive and confidential."
- Payroll diversion: An email from an employee (real or spoofed) to HR asks to change their direct deposit information to a new bank account.
Protection measures:
- Verify all financial requests through a separate channel. Call the person directly using a known phone number (not one from the email) to confirm the request.
- Implement dual authorization for wire transfers and payment changes โ no single person should be able to approve large transfers.
- Establish out-of-band verification procedures for changes to vendor banking details.
- Train finance teams to recognize BEC patterns and feel empowered to delay and verify, even when the request claims urgency or comes from a senior executive.
SMS Phishing (Smishing)
Smishing โ phishing via text messages โ has exploded as people increasingly trust texts more than emails. SMS messages have a 98% open rate (versus ~20% for email) and people tend to respond faster and less critically to texts.
Common smishing scenarios in 2026:
- Package delivery: "USPS: Your package could not be delivered. Confirm your address: [link]" or "FedEx: Delivery scheduled for today. Track here: [link]." These spike during holiday shopping seasons.
- Bank alerts: "Chase: Unusual activity detected on your account. Verify at: [link]" โ often timed to arrive when you might plausibly have made a recent transaction.
- Tolling scams: "You have an unpaid toll balance of $6.99. Pay now to avoid a $35 late fee: [link]." These have massively increased since 2024 and target millions.
- Two-factor code theft: "Your verification code is 483291. If you didn't request this, click here to secure your account." The link leads to a credential harvesting page that also captures the 2FA code you type.
- Tax season scams: "IRS: Action required on your 2025 tax return. Review at: [link]" โ timed to arrive during tax season.
Why smishing is effective:
- Text messages feel more personal and urgent than email
- Phone screens show abbreviated URLs, making it harder to inspect destinations
- People are accustomed to receiving legitimate notifications via text (2FA codes, delivery updates, bank alerts)
- SMS has weaker spam filtering compared to email
Protection:
- Never click links in unexpected texts. If you think it might be legitimate, open the company's app or website directly.
- Register your number on the Do Not Call Registry and report spam texts to 7726 (SPAM)
- Enable spam filtering on your phone (built into iOS and Android)
- Be skeptical of any text requesting action, especially with a link โ this applies even if it appears to come from a company you use
Voice Phishing and AI Deepfakes
Voice phishing (vishing) has transformed with AI voice cloning. Attackers can now create convincing reproductions of familiar voices using only a few seconds of sample audio from social media, YouTube, or voicemail.
Current threat landscape:
- AI voice clone scams: An attacker clones a family member's voice and calls claiming an emergency โ "Mom, I've been in an accident. I need you to send money." The voice sounds exactly like the real person, complete with speech patterns and emotional expression.
- Executive impersonation calls: Deepfake audio of a CEO instructing an employee to make an urgent wire transfer. In a documented 2024 case, a company lost $25 million to a deepfake video call where attackers impersonated the CFO.
- Tech support scams: Calls claiming to be from Microsoft, Apple, or your ISP, warning about detected malware or suspicious activity on your account. They ask for remote access to your computer or payment for "repairs."
- Bank fraud calls: "This is your bank's fraud department. We've detected suspicious charges. To verify your identity, please provide your account number and PIN." Real fraud departments will never ask for your full PIN or password.
- IRS/government impersonation: Threatening calls claiming you owe back taxes or face arrest. The real IRS contacts taxpayers by mail first, not phone calls.
How to protect yourself:
- Establish a family code word โ a secret word or phrase that family members use to verify identity in emergency calls
- If a call creates urgency, hang up and call back using a number you know is legitimate
- Never provide sensitive information to inbound callers โ banks, government agencies, and tech companies don't call to ask for passwords or PINs
- Be skeptical of any unexpected call requesting money or sensitive information, even if the voice sounds familiar
- For business: Require multi-person authorization for financial decisions and establish clear verification procedures that can't be bypassed by a single phone call
QR Code Phishing (Quishing)
Quishing โ phishing via QR codes โ has surged as QR code usage expanded post-pandemic. QR codes are everywhere: restaurant menus, parking meters, event tickets, business cards, and advertisements.
How quishing works:
- Attackers create a QR code that links to a malicious website
- The QR code is placed where victims will scan it โ printed stickers over legitimate QR codes, fake parking meters, phishing emails with QR images, or posted in public places
- The victim scans the QR code with their phone
- The phone opens a malicious URL that may harvest credentials, install malware, or steal session tokens
Why it's dangerous:
- QR codes hide the URL. Unlike text links, you can't hover over a QR code to preview the destination. You don't see where it goes until after you scan it.
- Phones are the target. QR codes are scanned by phones, which have smaller screens, making it harder to inspect URLs, and may have fewer security tools than desktops.
- Physical trust. A QR code on what appears to be an official sign, parking meter, or restaurant table seems trustworthy.
Real-world examples:
- Parking meter scams: Fake QR code stickers placed on parking meters that direct to payment pages collecting credit card details
- Package delivery cards: "You have a package โ scan to reschedule delivery" cards left in mailboxes
- Conference badges: Fake QR codes on lanyards at professional events
- Email QR codes: Phishing emails containing QR code images instead of clickable links (bypasses link scanning by email security tools)
Protection:
- Preview URLs before opening. Modern phone cameras show the URL preview before you visit it โ check it carefully.
- Don't scan QR codes from unknown sources. Be especially cautious of codes on stickers (which could be placed over legitimate ones).
- Use your phone's built-in camera rather than third-party QR scanner apps, which may have weaker security.
- For restaurants and payments, type the URL directly if possible rather than scanning.
MFA Fatigue Attacks
When an attacker has stolen your password but is blocked by multi-factor authentication, they may attempt an MFA fatigue (or MFA bombing) attack.
How it works:
- The attacker has your username and password (from a data breach, phishing, or credential stuffing)
- They repeatedly attempt to log into your account, triggering MFA push notifications to your phone
- You receive dozens of authentication requests โ "Did you just try to sign in?"
- Exhausted or confused, you accidentally hit "Approve" โ or approve deliberately just to make the notifications stop
- The attacker is now in your account
This attack was famously used in the 2022 Uber breach, where a teenager spammed an employee with MFA push notifications and then contacted them on WhatsApp pretending to be IT support, eventually getting them to approve the login.
Protection:
- Use number-matching MFA. Instead of simple approve/deny, modern MFA systems require you to enter a number displayed on the login screen. This prevents blind approval.
- Never approve unexpected MFA prompts. If you receive an authentication request you didn't initiate, it means someone has your password. Deny the request and change your password immediately.
- Use hardware security keys (FIDO2/WebAuthn). These require physical possession and physical interaction โ there's nothing to approve remotely.
- Report repeated MFA prompts to your IT security team โ it's an active attack.
Comprehensive Protection Strategies
A layered defense against all phishing types:
Technical defenses:
- Password manager โ prevents credential entry on phishing sites (domain doesn't match)
- Hardware security keys โ phishing-proof authentication (FIDO2/WebAuthn)
- Email filtering โ enterprise email security tools catch many phishing attempts
- DNS filtering โ blocks known malicious domains at the network level
- Browser protection โ modern browsers warn about known phishing sites
- Endpoint protection โ anti-malware software catches malicious attachments
Behavioral defenses:
- Verify through separate channels. Any request for money, credentials, or sensitive actions should be verified via phone call, in-person, or separate message thread.
- Take your time. Urgency is the attacker's primary weapon. The five-minute pause to verify is your best defense.
- Be skeptical of the unexpected. Unexpected emails, texts, calls, or QR codes requesting action deserve extra scrutiny.
- When in doubt, don't click. Navigate directly to the website in question.
Use strong, unique passwords generated by our password generator for every account. Even if one set of credentials is phished, the damage is limited to that single account.
Phishing is an arms race between attackers and defenders. As AI makes attacks more convincing and multi-channel, your defense must evolve too. The fundamentals haven't changed โ verify before you trust, pause before you act, and use technical tools that catch what your eyes might miss. Skepticism isn't paranoia; it's your best security tool.