{"id":26211,"date":"2025-12-09T01:13:16","date_gmt":"2025-12-09T01:13:16","guid":{"rendered":"https:\/\/compliancert.com\/?p=26211"},"modified":"2025-12-09T01:17:31","modified_gmt":"2025-12-09T01:17:31","slug":"die-phishing-welle-im-jahr-2025","status":"publish","type":"post","link":"https:\/\/compliancert.com\/de\/artikel\/die-phishing-welle-im-jahr-2025\/","title":{"rendered":"Die Phishing-Welle im Jahr 2025"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"26211\" class=\"elementor elementor-26211\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0cc5771 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0cc5771\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f678174\" data-id=\"f678174\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-490ef96 elementor-widget elementor-widget-text-editor\" data-id=\"490ef96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing ist nicht nur eine anhaltende Bedrohung, sondern entwickelt sich auch in einem alarmierenden Tempo weiter. F\u00fcr <strong>Einhaltung der Vorschriften<\/strong> Die Kenntnis der neuesten Statistiken ist f\u00fcr Fachleute aus dem Bereich der Informationssicherheit von entscheidender Bedeutung, wenn es darum geht, wirksame Schutzma\u00dfnahmen zu ergreifen und die Einhaltung von Vorschriften in einer zunehmend feindseligen Cybersicherheitslandschaft zu gew\u00e4hrleisten.<\/p><p>Die Daten aus dem Jahr 2025 best\u00e4tigen, dass das menschliche Element das schw\u00e4chste Glied bleibt und dass <strong>K\u00fcnstliche Intelligenz (KI)<\/strong> definiert das Cyberrisiko neu.<!-- notionvc: f1f0f371-a461-47af-9dc6-c2fae8055b66 --><!-- notionvc: a0524eab-007c-498f-8853-3925b6c9388f --><!-- notionvc: bb95d0f6-fbee-44d6-bab4-bcf1597bb03b --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-2d8c310 e-flex e-con-boxed e-con e-parent\" data-id=\"2d8c310\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8a519c elementor-widget elementor-widget-image\" data-id=\"e8a519c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"550\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1024%2C550&amp;ssl=1\" class=\"attachment-large size-large wp-image-26212\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?resize=300%2C161&amp;ssl=1 300w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?resize=1024%2C550&amp;ssl=1 1024w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?resize=768%2C413&amp;ssl=1 768w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?resize=18%2C10&amp;ssl=1 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dccf118 e-flex e-con-boxed e-con e-parent\" data-id=\"dccf118\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c37412b elementor-widget elementor-widget-text-editor\" data-id=\"c37412b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Das gro\u00dfe Bild: Phishing als Katalysator f\u00fcr Sicherheitsverletzungen<\/h3><p>Phishing ist nach wie vor die h\u00e4ufigste Angriffstaktik, die immer gr\u00f6\u00dfere finanzielle und betriebliche Auswirkungen hat:<\/p><ul><li><strong>Prim\u00e4rer Einstiegspunkt:<\/strong> Phishing ist in etwa an folgenden F\u00e4llen beteiligt <strong>36%<\/strong> aller Datenschutzverletzungen und ist damit in vielen M\u00e4rkten die h\u00e4ufigste Angriffsart.<\/li><li><strong>T\u00e4gliche Bedrohung:<\/strong> Ungef\u00e4hr <strong>57%<\/strong> der Unternehmen berichten, dass sie w\u00f6chentlich oder t\u00e4glich mit Phishing-Betrug konfrontiert werden. Das Volumen ist atemberaubend, mit etwa <strong>3,4 Milliarden<\/strong> Phishing-E-Mails werden t\u00e4glich weltweit verschickt.<\/li><li><strong>Das menschliche Element:<\/strong> Rund um <strong>60%<\/strong> zu <strong>69%<\/strong> der Sicherheitsverst\u00f6\u00dfe haben ein menschliches Element, z. B. gestohlene Zugangsdaten oder Social Engineering, wobei Phishing ein Hauptfaktor ist. Eine schnelle Reaktion ist entscheidend: Schlecht ausgebildete Mitarbeiter erh\u00f6hen die Kosten des Vorfalls.<\/li><\/ul><h3>Die prohibitiven Kosten von Phishing f\u00fcr Unternehmen<\/h3><p>Verst\u00f6\u00dfe im Zusammenhang mit Phishing sind nicht nur Sicherheitsvorf\u00e4lle, sondern auch finanzielle Katastrophen, die die Aufmerksamkeit der Compliance-Abteilung und der Gesch\u00e4ftsleitung erfordern:<\/p><ul><li><strong>Durchschnittliche Kosten einer Sicherheitsverletzung:<\/strong> Die durchschnittlichen Kosten einer durch Phishing verursachten Datenschutzverletzung haben sich auf <strong>$4,88 Millionen<\/strong> USD.<\/li><li><strong>Verluste durch BEC:<\/strong> <strong>Business Email Compromise (BEC)<\/strong>-eine Form von hochgradig gezieltem Phishing-verursacht ungef\u00e4hr <strong>$2,7 Milliarden<\/strong> an Verlusten in den USA im Jahr 2024 und stellt damit eine der zerst\u00f6rerischsten Formen der Cyberkriminalit\u00e4t im Finanzbereich dar.<\/li><li><strong>J\u00e4hrliche Kosten f\u00fcr Gro\u00dfunternehmen:<\/strong> Phishing-Angriffe kosten gro\u00dfe Unternehmen durchschnittlich <strong>$15 Millionen<\/strong> j\u00e4hrlich, oder mehr als <strong>$1,500<\/strong> pro Mitarbeiter.<\/li><\/ul><h3>Die durch KI beschleunigte Bedrohung<\/h3><p>Die Verbreitung von generativen KI-Tools hat das Spiel ver\u00e4ndert und erm\u00f6glicht es Angreifern, in gro\u00dfem Umfang \u00fcberzeugendere Nachrichten zu erstellen und Sicherheitsfilter zu umgehen:<\/p><ul><li><strong>Exponentielle Steigerung:<\/strong> Die Phishing-Aktivit\u00e4ten haben insgesamt um <strong>49%<\/strong> seit 2021, was vor allem auf die Verwendung von KI-generierten Nachrichten zur\u00fcckzuf\u00fchren ist.<\/li><li><strong>KI-gest\u00fctzte Angriffe:<\/strong> Eine gesch\u00e4tzte <strong>80%<\/strong> der Phishing-Angriffe werden inzwischen durch KI generiert, was auf eine ausgekl\u00fcgelte und kontinuierliche Automatisierung hindeutet.<\/li><li><strong>Berechtigungsnachweise in Gefahr:<\/strong> Phishing von Zugangsdaten hat um ein Vielfaches zugenommen <strong>1,265%<\/strong> seit der Einf\u00fchrung von fortschrittlichen KI-Tools wie ChatGPT.<\/li><li><strong>Verbessertes BEC:<\/strong> Ungef\u00e4hr <strong>40%<\/strong> der BEC-E-Mails im zweiten Quartal wurden als KI-generiert best\u00e4tigt.<\/li><\/ul><h3>Neue Vektoren und Opferprofile<\/h3><p>Die Angreifer gehen \u00fcber die traditionelle E-Mail hinaus, und auch das Profil der Opfer \u00e4ndert sich:<\/p><ul><li><strong>Mehrkanalig:<\/strong> \u00dcber <strong>40%<\/strong> der Phishing-Kampagnen gehen inzwischen \u00fcber E-Mail hinaus und nutzen Plattformen wie <strong>Slack, Teams und soziale Medien<\/strong>. Es gab eine <strong>19%<\/strong> Zunahme von <em>l\u00e4chelnd<\/em> (SMS-Phishing) und <strong>11%<\/strong> in <em>vishing<\/em> (Stimmenphishing).<\/li><li><strong>Die verletzlichste Generation:<\/strong> <strong>Generation Z<\/strong> und <strong>Millennials<\/strong> Nutzer sind am ehesten Opfer von Phishing-Angriffen.<\/li><li><strong>Fernarbeitskr\u00e4fte:<\/strong> <strong>62%<\/strong> der Fachleute f\u00fcr Informationssicherheit geben an, dass Phishing-Angriffe seit der Umstellung auf Telearbeit st\u00e4rker zugenommen haben als jede andere Art von Bedrohung.<\/li><li><strong>Die meisten Zielsektoren:<\/strong> Die wichtigsten Zielsektoren sind weltweit <strong>Internetdienste (32.8%)<\/strong>, <strong>Telekommunikation (20.7%)<\/strong>und <strong>Finanzdienstleistungen (18.8%)<\/strong>.<\/li><\/ul><h3>Das Gebot der Einhaltung und Abschw\u00e4chung<\/h3><p>F\u00fcr die Compliance-Abteilung sind diese Statistiken nicht nur interessante Daten, sondern auch ein Beweis daf\u00fcr, dass die bestehenden Sicherheits- und Schulungsprogramme unzureichend sind.<\/p><p>Das Risiko von Compliance-Fehlern steigt exponentiell, wenn die menschliche Sicherheit versagt, was zu Geldbu\u00dfen und Rufsch\u00e4digung f\u00fchrt.<\/p><blockquote><p>Wichtige Ma\u00dfnahmen zur Einhaltung der Vorschriften:<\/p><ol><li><strong>Kontinuierliche Anti-Phishing-Schulungen:<\/strong> Sensibilisierungsschulungen k\u00f6nnen keine einmaligen Ereignisse sein. Sie muss kontinuierlich erfolgen und auf realistischen Simulationen basieren, wobei der Schwerpunkt auf neuen Angriffsvektoren wie KI, QR-Codes und Messaging-Plattformen liegen muss.<\/li><li><strong>Robuste MFA:<\/strong> Implementieren und \u00fcberpr\u00fcfen Sie die Verwendung der Multi-Faktor-Authentifizierung (MFA) f\u00fcr alle wichtigen Konten. Die Compliance-Abteilung muss sich jedoch dar\u00fcber im Klaren sein, dass selbst MFA in etwa <strong>25%<\/strong> von Kampagnen, die QR-Codes oder getarnte Links verwenden.<\/li><li><strong>Aktive BEC-\u00dcberwachung:<\/strong> Priorisieren Sie die Erkennung von Anomalien in der E-Mail-Kommunikation, insbesondere wenn es um finanzielle Transaktionen oder sensible Daten geht.<\/li><\/ol><\/blockquote><p>Die Phishing-Landschaft des Jahres 2025 erfordert eine dringende Neubewertung der Sicherheits- und Compliance-Strategien. Die KI hat den Angreifern den R\u00fccken gest\u00e4rkt, aber die Kenntnis der Taktiken und die Schulung der Mitarbeiter bleiben die wichtigsten Verteidigungsma\u00dfnahmen.<!-- notionvc: 14dbb44c-2442-44d3-9eec-80d2b6f6b1aa --><!-- notionvc: 56f0ec73-524e-4532-98a8-58610e2612fa --><\/p><p><!-- notionvc: c73506c8-fa90-4918-bf29-9271b727252e --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a68fccf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a68fccf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-72ddec2\" data-id=\"72ddec2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a21662e elementor-align-start elementor-mobile-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a21662e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-brand-symbol\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Wir k\u00f6nnen Ihnen helfen, FADP-konform zu werden!<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9953c7 elementor-widget elementor-widget-text-editor\" data-id=\"e9953c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fachkundige Beratung, erschwingliche L\u00f6sungen und ein nahtloser Weg zur Einhaltung der Vorschriften<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1c96bc0\" data-id=\"1c96bc0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-461faa9 elementor-align-right elementor-widget__width-auto elementor-tablet-align-justify elementor-mobile-align-justify elementor-widget-tablet__width-inherit elementor-widget-mobile__width-inherit vamtam-has-underline-anim elementor-widget elementor-widget-button\" data-id=\"461faa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/compliancert.com\/de\/kontakt-2\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Nehmen Sie Kontakt auf<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-a61e06c e-flex e-con-boxed e-con e-parent\" data-id=\"a61e06c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Schockierende Statistiken und die Herausforderung der Compliance<\/p>","protected":false},"author":5,"featured_media":26212,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[67,75],"tags":[21,108,113,296,167,34],"class_list":["post-26211","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-frameworks-and-regulations","tag-ai","tag-compliance","tag-cyber-security","tag-infosec","tag-phishing","tag-risk-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Phishing Surge in 2025 - ComplianceRT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compliancert.com\/de\/artikel\/die-phishing-welle-im-jahr-2025\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Phishing Surge in 2025 - ComplianceRT\" \/>\n<meta property=\"og:description\" content=\"Shocking Statistics and the Compliance Challenge\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compliancert.com\/de\/artikel\/die-phishing-welle-im-jahr-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"ComplianceRT\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-09T01:13:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T01:17:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"645\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Karina Ladeira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Karina Ladeira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\"},\"author\":{\"name\":\"Karina Ladeira\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/65efd9b371d4ab20b3757fe2b1361971\"},\"headline\":\"The Phishing Surge in 2025\",\"datePublished\":\"2025-12-09T01:13:16+00:00\",\"dateModified\":\"2025-12-09T01:17:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\"},\"wordCount\":663,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1\",\"keywords\":[\"AI\",\"compliance\",\"cyber security\",\"infosec\",\"Phishing\",\"Risk Management\"],\"articleSection\":[\"Articles\",\"Frameworks and Regulations\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\",\"name\":\"The Phishing Surge in 2025 - ComplianceRT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1\",\"datePublished\":\"2025-12-09T01:13:16+00:00\",\"dateModified\":\"2025-12-09T01:17:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1\",\"width\":1200,\"height\":645},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/compliancert.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Phishing Surge in 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"name\":\"ComplianceRT\",\"description\":\"AI-Powered Compliance Tool &amp; Automation Platform | GDPR | ISO27001 | EU AI Act | NIS2\",\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/compliancert.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\",\"name\":\"RT Europe SA\",\"alternateName\":\"RT\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"contentUrl\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"width\":116,\"height\":60,\"caption\":\"RT Europe SA\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compliancert\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/65efd9b371d4ab20b3757fe2b1361971\",\"name\":\"Karina Ladeira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g\",\"caption\":\"Karina Ladeira\"},\"url\":\"https:\\\/\\\/compliancert.com\\\/de\\\/author\\\/karina-ladeira\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Die Phishing-Welle im Jahr 2025 - ComplianceRT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compliancert.com\/de\/artikel\/die-phishing-welle-im-jahr-2025\/","og_locale":"de_DE","og_type":"article","og_title":"The Phishing Surge in 2025 - ComplianceRT","og_description":"Shocking Statistics and the Compliance Challenge","og_url":"https:\/\/compliancert.com\/de\/artikel\/die-phishing-welle-im-jahr-2025\/","og_site_name":"ComplianceRT","article_published_time":"2025-12-09T01:13:16+00:00","article_modified_time":"2025-12-09T01:17:31+00:00","og_image":[{"width":1200,"height":645,"url":"https:\/\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg","type":"image\/jpeg"}],"author":"Karina Ladeira","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Karina Ladeira","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#article","isPartOf":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/"},"author":{"name":"Karina Ladeira","@id":"https:\/\/compliancert.com\/#\/schema\/person\/65efd9b371d4ab20b3757fe2b1361971"},"headline":"The Phishing Surge in 2025","datePublished":"2025-12-09T01:13:16+00:00","dateModified":"2025-12-09T01:17:31+00:00","mainEntityOfPage":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/"},"wordCount":663,"commentCount":0,"publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"image":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","keywords":["AI","compliance","cyber security","infosec","Phishing","Risk Management"],"articleSection":["Articles","Frameworks and Regulations"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/","url":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/","name":"Die Phishing-Welle im Jahr 2025 - ComplianceRT","isPartOf":{"@id":"https:\/\/compliancert.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#primaryimage"},"image":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","datePublished":"2025-12-09T01:13:16+00:00","dateModified":"2025-12-09T01:17:31+00:00","breadcrumb":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#primaryimage","url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","contentUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","width":1200,"height":645},{"@type":"BreadcrumbList","@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compliancert.com\/"},{"@type":"ListItem","position":2,"name":"The Phishing Surge in 2025"}]},{"@type":"WebSite","@id":"https:\/\/compliancert.com\/#website","url":"https:\/\/compliancert.com\/","name":"ComplianceRT","description":"KI-gest\u00fctztes Compliance-Tool &amp; Automatisierungsplattform | DSGVO | ISO27001 | EU AI Act | NIS2","publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compliancert.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/compliancert.com\/#organization","name":"RT Europe SA","alternateName":"RT","url":"https:\/\/compliancert.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/","url":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","contentUrl":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","width":116,"height":60,"caption":"RT Europe SA"},"image":{"@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compliancert\/"]},{"@type":"Person","@id":"https:\/\/compliancert.com\/#\/schema\/person\/65efd9b371d4ab20b3757fe2b1361971","name":"Karina Ladeira","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g","caption":"Karina Ladeira"},"url":"https:\/\/compliancert.com\/de\/author\/karina-ladeira\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/posts\/26211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/comments?post=26211"}],"version-history":[{"count":3,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/posts\/26211\/revisions"}],"predecessor-version":[{"id":26215,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/posts\/26211\/revisions\/26215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/media\/26212"}],"wp:attachment":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/media?parent=26211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/categories?post=26211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/tags?post=26211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}