Skip to main content
All CollectionsEmail Authentication Protocols
The Psychology of Phishing Clicks: New Studies from US Security Researchers

The Psychology of Phishing Clicks: New Studies from US Security Researchers

New 2025 studies reveal the psychological triggers behind phishing clicks here’s what security teams can learn & how DMARC help reduce risk.

Updated this week

🧠 Why Smart People Still Fall for Phishing Emails

Let’s get real—phishing is no longer just about bad grammar and sketchy links. In 2025, cybercriminals are crafting highly convincing, emotionally charged emails that prey on human instincts—not technical vulnerabilities.

Recent research from US cybersecurity think tanks and behavior labs shows that even trained professionals can fall for a phishing trap if the psychological bait is right.

“Phishing isn’t just a technical issue. It’s a human issue.” — Dr. Jamie Roth, Lead Researcher, Cyberpsych Lab, California


🔍 What the New Studies Found

🎯 Study 1: Emotional Manipulation Works (Too Well)

A Stanford-led study tracked over 5,000 email users and revealed:

  • 71% of users clicked on phishing emails that induced urgency (e.g., “You’re out of compliance,” or “Suspicious login detected”)

  • Emails that triggered fear, curiosity, or excitement had higher click-through rates than those with neutral tone

  • Even users trained in phishing awareness clicked when emails came from spoofed authority figures (like IT admins or executives)

Takeaway:
Fear of missing out, anxiety, and workplace pressure are stronger than cyber training in many cases.


📱 Study 2: Mobile Users Are 3x More Likely to Click

Another study from a Chicago-based cybersecurity lab found that:

  • Mobile users clicked on phishing emails 3x more than desktop users

  • Why? Smaller screen sizes made it harder to spot spoofed URLs, incorrect email addresses, or poor formatting

  • Users were also more distracted or rushed while checking emails on-the-go

Takeaway:
Even secure environments can’t protect users if behavioral conditions make them more vulnerable.


👥 Study 3: Role-Based Targeting Increases Success Rates

A New York State University team experimented with simulated spear-phishing attacks targeting different job functions. They found:

  • Finance, HR, and Executive Assistants had the highest open and click rates

  • Role-specific language (e.g., “Update payroll system” or “Board meeting minutes”) increased believability

  • The title of the email mattered more than the sender or content for initial clicks

Takeaway:
Phishing attackers do their homework—your role at work determines how you’ll be attacked.


😲 Why People Click—According to Psychology

Here are the top cognitive triggers behind phishing clicks:

Trigger

Description

Urgency

“You must act now” bypasses logical thinking

Authority

Fake emails from CEOs or IT staff command instant compliance

Scarcity

“Only 3 hours left to secure your account” taps into FOMO

Reciprocity

Emails offering help or gifts make people feel obligated

Routine

Users fall into auto-pilot, especially with repeated prompts

Phishing succeeds not because people are careless, but because the messages are crafted to exploit how the brain works under stress.


📉 Where Technology Fails Without Psychology

Even the best MFA, antivirus, or firewall can’t help if the user clicks first. Phishing isn’t just a tech war—it’s a psychological battle. And that’s where email domain protection makes all the difference.


🛡️ How YourDMARC Helps Prevent the “Click” from Ever Happening

YourDMARC protects your organization at the first line of defense: the inbox.

✅ Blocks Spoofed Emails

With enforced DMARC, SPF, and DKIM, YourDMARC ensures only verified senders can use your domain.

👀 Stops Lookalike Domains

Our platform flags near-identical domains (like @you-rdmarc.com) before attackers can use them.

📊 Tracks Email Behavior

See which departments are most targeted, which emails got through, and how your policy is performing.

🔔 Real-Time Alerts

Get notified if someone tries to spoof your domain or impersonate your leadership team.

If the phishing email never reaches your employee, the psychology behind the click doesn’t matter.


📚 What Can Security Teams Learn From This?

1. Train for Emotion, Not Just Logic
Use phishing simulations that reflect emotional manipulation, not just suspicious links.

2. Role-Specific Awareness
Tailor your training for departments like finance, HR, and assistants. They’re high-value targets.

3. Encourage "Think Twice" Culture
Create safe spaces for employees to ask, “Is this email real?” without shame.

4. Analyze Click Data Regularly
Use tools like YourDMARC to identify top targets and adjust your security playbook accordingly.


🔐 Don’t Just Train People—Protect Them First

People will always make mistakes. But those mistakes don’t have to cost your organization.

By enforcing email authentication and combining it with psychologically informed training, you can cut your phishing risk dramatically.

Think of YourDMARC as the mental health support for your inbox—it keeps unnecessary stress (and threats) out of sight.


Let our experts show you exactly how vulnerable your domain is—and how to fix it fast. Contact us now!

Did this answer your question?