Funnel overlay image

Blog | 3-minute Read

Zombie phishing: The hidden horror lurking in your inbox

Nicci Smart

Security Analyst

Published: 24 February 2025

Zombie phishing is an email hijacking scam that can cause your organisation nightmares. Find out why it’s on the rise and what you can do to stay protected against this increasingly common threat.

In the Kocho security team, we’re always on the lookout for new trends and tactics looking to exploit weaknesses in organisations.

Which is why we want to talk to you about zombie phishing.

Also known as conversation hijacking, it’s a particularly sneaky type of phishing that infiltrates its way into legitimate conversations and uses your own email threads against you.

And it’s a horror story that’s growing in popularity.

quote icon

Conversation hijacking has risen by 70% since 2022.

Barracuda

How zombie phishing attacks work

Unlike regular phishing scams that send mass emails pretending to be from trusted sources, zombie phishing takes a more subtle route.

It starts with a compromised account, often breached via stolen credentials or malware.

From there, hackers:

  • Monitor real email conversations, scouting for the perfect moment to strike.
  • Inject their own messages into the thread, posing as a trusted contact.
  • Embed malicious links or attachments that spread malware, steal credentials, or trigger fraudulent transactions.

Since the email comes from a real person, within an active conversation, there are no obvious red flags.

No suspicious email address. No strange formatting. No awkward grammar.

It feels real.

And that’s why it works.

Common zombie phishing attack methods

Zombie phishing gives attackers multiple ways to break in. Knowing how these threats work can help businesses and employees stay ahead.

Ebony and green password protected laptop icon on transparent background

Stolen passwords from fake login pages

Hackers send links to convincing but fake login pages. If you enter your details, they grab your credentials and gain access to your emails. URL shorteners like bit.ly, making them even harder to spot.

Ebony and green file padlock icon on transparent background

Malware from email attachments

Clicking an attachment in a hijacked conversation could install malware, giving hackers remote control over your device. Once they’re in, they can move through the network, gaining access to more accounts and systems.

Ebony email icon on transparent background

Business email scams (BEC fraud)

Cybercriminals pose as executives or finance staff, tricking employees into transferring money. Because they use real email threads, these scams look incredibly convincing.

Ebony and green PC monitor document icon on transparent background

Stealing company data

Hackers quietly extract valuable data like contracts, customer records, or intellectual property, and sell it on the dark web or use it for corporate espionage.

Ebony and green hand and mobile phone icon on transparent background

QR code phishing

Cybercriminals exploit the trust in QR codes by embedding phishing links that lead to fake login pages, often bypassing MFA. Since security filters treat QR codes as images, they’re harder to detect.

How to protect against conversation hijacking

Since zombie phishing attacks don’t look suspicious on the surface, traditional security measures aren’t enough.

Therefore, we recommend a more layered defence and response strategy that combines technology, process, and employee awareness.

Such as:

1. Employee education and awareness

Train employees to spot warning signs like unexpected attachments, writing style changes, or urgent financial requests. Encourage verification via a separate channel and conduct regular phishing simulations to reinforce awareness.

2. Implement robust email security measures

Use AI-powered cloud email security to detect evolving threats. Apply DMARC policies to prevent spoofing and deploy endpoint protection to block malicious payloads.

3. Enforce strong authentication mechanisms

Require MFA for email and critical apps. Promote password managers for strong, unique credentials. Use conditional access to block logins from untrusted locations or devices.

4. Strengthen incident response and monitoring

Have a clear incident response plan for email compromises. Encourage employees to report suspicious emails. Monitor accounts for unusual logins and unauthorised activity.

Final thoughts

Zombie phishing might sound like a term from The Walking Dead, but this is no work of fiction.

It’s a very real, very potent, and increasingly common cyber threat.

While organisations are getting better at spotting traditional phishing attempts (though there’s still plenty of work to do), attackers are finding new ways to slip through the cracks.

Using AI, they can mimic trusted contacts, hijack familiar communication channels, and deploy malicious payloads or steal sensitive data. All while staying under the radar.

Fighting back and staying protected requires the combined efforts of robust modern cloud email security, strong authentication policies, and continuous employee awareness training.

At Kocho, we help businesses stay ahead of emerging threats, combining AI-driven security solutions with expert-led protection.

If you want to ensure your organisation is zombie-proof, get in touch. We’re here to help.

Key takeaways

  • Zombie phishing hijacks real email conversations to spread malware and steal credentials.

  • Unlike traditional phishing, it exploits trusted contacts, making it harder to spot.

  • Attackers use stolen credentials, malware, and BEC scams to impersonate users.

  • A strong defence combines AI-driven email security, MFA, and DMARC policies.

  • Regular phishing simulations and security training help employees stay alert.

  • Proactive threat monitoring and rapid detection are crucial to minimising damage.

tag icon

Free Guide

The Ultimate Guide to Microsoft Security

The most comprehensive guide to Microsoft Security. Over 50 pages. Microsoft licensing and pricing simplified.

Discover technologies that:

  • Detect and disrupt advanced attacks at machine-speed
  • Tap into the world’s largest threat intelligence network
  • Protect identities, devices, and data with ease
tag icon

Great protection starts here

Keep pace with the latest security threats

Sign up to receive the latest threat intelligence articles and reports from our SecOps team.

You’ll get:

  • Notifications of critical vulnerabilities
  • Recommendations to reduce your risk level
  • Expert advice to defend against new threats
Butterfly overlay image

Author

Nicci Smart

Security Analyst

Nicci is a Security Analyst in Kocho’s Security Operations team. She has extensive experience in IT and cybersecurity with a skill set that includes Active Directory, Office 365, Windows Servers, Microsoft Exchange, and Machine Builds and Repairs. She also holds an SC-900 certification, recognition of expertise in security, compliance, and identity. 

Butterfly overlay image

Got a question? Need more information?

Our expert team is here to help.