Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

March 2026 Phishing Email Trends Report

0
Medium
Published: Wed Apr 22 2026 (04/22/2026, 07:06:43 UTC)
Source: AlienVault OTX General

Description

In March 2026, trojans represented 21% of attachment-based threats, while phishing attacks using fake pages dropped from 42% to 15% month-over-month. Script-based malware increased significantly, with HTML at 14% and JavaScript at 11%. Compressed files including ZIP (14%), RAR (8%), and 7Z (5%) were common distribution methods. Document-based threats utilized PDF (13%), XLS (5%), and DOCX (2%) files. Attackers impersonated courier services like FedEx and DHL, as well as financial institutions including Hana Bank and Woori Bank. Distribution methods included HTML scripts and PDF hyperlinks leading to credential-stealing pages. Notable malware families included RemcosRAT and AgentTesla, with command-and-control infrastructure utilizing Telegram API tokens and external mail servers for data exfiltration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/22/2026, 09:03:33 UTC

Technical Analysis

This report details phishing email trends observed in March 2026, emphasizing the prevalence of trojans in attachment-based threats and a decline in phishing via fake pages. Script-based malware attacks using HTML and JavaScript increased notably. Attackers commonly used compressed files and document formats to distribute malware. Impersonation of courier and financial services was a key social engineering tactic. Malware families RemcosRAT and AgentTesla were identified, leveraging Telegram API tokens and external mail servers for command-and-control and data exfiltration. The report does not indicate any specific software vulnerabilities or exploits, nor does it reference patches or vendor advisories.

Potential Impact

The impact involves increased phishing and malware campaigns that can lead to credential theft and unauthorized access through trojans and script-based malware. The use of trusted brand impersonation increases the likelihood of successful social engineering attacks. Data exfiltration via command-and-control infrastructure using Telegram API tokens and external mail servers can compromise sensitive information. There are no known exploits in the wild targeting specific software vulnerabilities, and no direct patch or remediation is applicable.

Mitigation Recommendations

Since this report describes phishing and malware campaign trends rather than a specific software vulnerability, no direct patch or official fix is applicable. Organizations should focus on user awareness training to recognize phishing attempts, implement email filtering to detect malicious attachments and scripts, and monitor for indicators of compromise related to RemcosRAT and AgentTesla malware. Employing multi-factor authentication can reduce the risk of credential theft exploitation. No vendor advisory or patch information is provided; thus, patch status is not applicable.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/93465/"]
Adversary
null
Pulse Id
69e8738326fb86b891dd3c1f
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domaincontroller.airdns.org
domainccp11nl.hyperhost.ua

Hash

ValueDescriptionCopy
hash06dc18771404694814d6a430bb65d1a3
hash0a15c9a545fbf78d77f8c130a3b0f840
hash0a18f61e8d8e9873cdda4b3b6785d7ad
hash0d15bf48b73de307eff29f07a6e6d55b
hash0e9bd0c9991b21b13eddb518dee0eecf

Threat ID: 69e8876919fe3cd2cd808c5d

Added to database: 4/22/2026, 8:31:37 AM

Last enriched: 4/22/2026, 9:03:33 AM

Last updated: 4/23/2026, 1:09:39 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses