AI vs Human Endeavors in Phishing: An Examination of the IBM X-Force Research on Cybersecurity Threats

Phishing, a technique employed by threat actors to deceive individuals into divulging sensitive information, remains the primary infection vector for cybersecurity incidents. IBM X-Force undertook a groundbreaking research project led by Chief People Hacker Stephanie “Snow” Carruthers, exploring the efficiency of human-written phishing emails compared to those generated by AI language models. Their findings shed light on the factors contributing to the success of human-written emails, the looming threat of AI tools, and offer recommendations to counter the growing influence of generative AI in cybercrime.

The research project by IBM X-Force, under the guidance of Stephanie Carruthers, aimed to examine the effectiveness of human-written and AI-generated phishing emails. Carruthers sought to ascertain whether AI-based approaches could outperform the human touch in deceiving recipients.

Click Rates of Human-Written vs. AI-Generated Phishing Emails

Analyzing the data, Carruthers discovered that human-written phishing emails exhibited a 3% higher click rate compared to their AI-generated counterparts. Delving deeper, it was revealed that the AI-generated emails garnered an 11% click rate, while human-written emails proved slightly more successful at 14%.

Factors Contributing to the Success of Human-Written Emails

The researchers attribute the success of human-written emails to their ability to appeal to human emotional intelligence. These emails were crafted carefully, exploiting psychological triggers and persuading recipients to take action. Furthermore, the selection of a specific program within the organization, instead of employing vague or generic topics, allowed the human-written emails to appear more authentic and relevant.

Threat of AI Tools for Phishing

The emergence of tools such as WormGPT, an industrial variant of ChatGPT, raises concerns over the potential for AI models to bypass ethical guardrails and facilitate sophisticated phishing attacks. These unrestrained AI versions offer a streamlined approach for attackers to scale their operations, intensifying the threat faced by organizations and individuals.

Phishing as the Common Infection Vector

IBM’s 2023 Threat Intelligence Index substantiates that phishing remains the most prevalent infection vector for cybersecurity incidents. With the continued evolution of AI and its integration in cybercrime, the significance of tackling phishing attacks becomes increasingly crucial.

Potential Use of Generative AI for Attackers

Carruthers highlights the possibility of generative AI augmenting open-source intelligence analysis for attackers. Though not explored in the research project, the growing sophistication of generative AI models may provide cybercriminals with advanced tools to orchestrate more efficient and targeted phishing campaigns.

As the research conducted by IBM X-Force reveals, human-written phishing emails still exhibit a superior success rate compared to their AI-generated counterparts. The ability to target emotional intelligence and adopt a personalized approach remains a fundamental advantage. However, as generative AI continues to advance, the threat landscape evolves, necessitating a holistic and collaborative approach to cybersecurity. Adapting preventive measures, enhancing employee training, and remaining vigilant against the capabilities of generative AI are crucial for organizations to protect themselves from the ever-growing peril of phishing attacks.

Explore more

A Beginner’s Guide to Data Engineering and DataOps for 2026

While the public often celebrates the triumphs of artificial intelligence and predictive modeling, these high-level insights depend entirely on a hidden, gargantuan plumbing system that keeps data flowing, clean, and accessible. In the current landscape, the realization has settled across the corporate world that a data scientist without a data engineer is like a master chef in a kitchen with

Ethereum Adopts ERC-7730 to Replace Risky Blind Signing

For years, the experience of interacting with decentralized applications on the Ethereum blockchain has been fraught with a precarious and dangerous uncertainty known as blind signing. Every time a user attempted to swap tokens or provide liquidity, their hardware or software wallet would present them with a wall of incomprehensible hexadecimal code, essentially asking them to authorize a financial transaction

Germany Funds KDE to Boost Linux as Windows Alternative

The decision by the German government to allocate a 1.3 million euro grant to the KDE community marks a definitive shift in how European nations view the long-standing dominance of proprietary operating systems like Windows and macOS. This financial injection, facilitated by the Sovereign Tech Fund, serves as a high-stakes investment in the concept of digital sovereignty, aiming to provide

Why Is This $20 Windows 11 Pro and Training Bundle a Steal?

Navigating the complexities of modern computing requires more than just high-end hardware; it demands an operating system that integrates seamlessly with artificial intelligence while providing robust security for sensitive personal and professional data. As of 2026, many users still find themselves tethered to aging software environments that struggle to keep pace with the rapid advancements in cloud computing and data

Notion Launches Developer Platform for AI Agent Management

The modern enterprise currently grapples with an overwhelming explosion of disconnected software tools that fragment critical information and stall meaningful productivity across entire departments. While the shift toward artificial intelligence promised to streamline these disparate workflows, the reality has often resulted in a chaotic landscape where specialized agents lack the necessary context to perform high-stakes tasks autonomously. Organizations frequently find