PHISHING ASSESSMENT · SOCIAL ENGINEERING

CREST-Certified Phishing Assessment and Social Engineering for UK Businesses

Phishing assessment goes beyond annual click-rate metrics. We deliver realistic adversary-mode phishing campaigns: AI-generated lures, MFA-fatigue testing, OAuth phishing, vishing, smishing, and physical pretext attacks. CREST methodology, sector-specific TTPs, executive-tier scope.

CREST Member · Verify ↗
Phishing & Social Engineering
EMAIL · VISHING · SMISHING
Multi-Channel Adversary Mode
MFA FATIGUE · OAUTH PHISHING
Modern TTPs · 2025 Edition
CREST
Approved Provider
PHISH
Multi-Channel Campaign
FREE
Retest Included
24h
Scope to Active Test
74%
of breaches involve a human element. Annual click-rate phishing exercises don’t test what real attackers actually do.

Click-rate metrics measure awareness. Adversary-mode phishing measures resilience.

Most “phishing assessments” send a templated email, count clicks, and produce a percentage. That’s awareness training, not security testing. It doesn’t reveal whether your MFA holds up against real OAuth-consent phishing, whether your SOC catches a vishing-driven help-desk handover, or whether a sector-targeted lure compromises your finance team.

Our phishing assessment runs adversary-mode campaigns: AI-generated lures based on current threat-actor TTPs, MFA-fatigue testing, OAuth-consent phishing for cloud account compromise, vishing (voice phishing) of help-desk and finance, smishing (SMS phishing) targeting executives, and where authorised, physical pretext attacks. Reports satisfy ISO 27001 A.6.3 awareness-training requirements, FCA Operational Resilience scenario evidence, and provide CISO-ready findings on cultural and process gaps.

12 PHISHING ATTACK VECTORS

What We Test in Phishing Assessment

Multi-channel adversary mode. Modern TTPs. Sector-specific lure design.

PH-1

Email Phishing

Targeted spear-phishing with sector-aware lures. Domain spoof / look-alike. Payload, credential harvest, or pretext-only.

PH-2

OAuth Consent Phishing

Modern cloud account takeover via fraudulent OAuth consent. Bypasses MFA. Targets Microsoft 365 / Google Workspace.

PH-3

MFA Fatigue

Repeated MFA push notifications until user accepts. Tests SOC alerting and user awareness of MFA bombing patterns.

PH-4

Vishing (Voice)

Help-desk impersonation, finance-team payment-fraud calls, IT-team password-reset requests. Pretext, recorded if authorised.

PH-5

Smishing (SMS)

Executive SMS phishing, mobile MFA reset attempts, banking-style mobile lures. Particularly effective against C-suite.

PH-6

Physical Pretext

Office tailgating, USB drop, courier impersonation, RFID badge cloning, dropbox device deployment. Authorised in writing.

PH-7

Whaling / BEC

Business Email Compromise targeting CFO, finance team, treasury. Wire-fraud lure design, supplier impersonation, M&A pretexts.

PH-8

AI-Generated Lures

LLM-generated phishing lures matching real adversary writing style. Tests resilience against polished modern phishing not flagged by basic filters.

PH-9

Domain Spoofing & Lookalike

Typosquat domain registration, IDN homoglyph attacks, look-alike Microsoft / Google portals, email-spoofing without DKIM/DMARC.

PH-10

Adversary-in-the-Middle (AitM)

Evilginx-style AitM attacks against MFA. Captures session tokens. Bypasses TOTP / push MFA. Defeats by FIDO2 / hardware keys only.

PH-11

Supply Chain Phishing

Pretexts simulating compromised suppliers, M&A counterparties, regulators. Tests cross-organisational trust assumptions.

PH-12

SOC Detection Validation

Coordinates campaign with your SOC for blue-team measurement. SOC alerts, ticket queue, response time, communication-cascade quality.

FOUR-PHASE METHODOLOGY

Phishing Assessment: From Threat Profile to Cultural Insight

Sector-aware threat profiling. Multi-channel campaign delivery. SOC-coordinated for blue-team measurement.

1

Threat Profile

Sector-specific adversary profiling, target list approval, scope/depth/legal sign-off, white-team contact list, get-out-of-jail letter.
2

Lure Development

AI-aware lure design, pretext development, infrastructure setup (domains, mail servers, AitM proxies, voice numbers).
3

Campaign Execution

Multi-channel campaign delivery over agreed window. Real-time dashboard for white team. SOC-coordinated for detection metrics.
4

Report & Briefing

Click-rate, credential-capture rate, MFA-bypass rate, vishing-handover rate, SOC detection latency, executive briefing on cultural gaps.

Verified Accreditations Auditors Accept

Every accreditation independently issued by a recognised UK certification body. Click CREST to verify our membership.

COMPLIANCE READY

Phishing Assessment Reports Mapped to Every Framework

Phishing assessment evidence accepted across compliance frameworks where social-engineering resilience is a control requirement.

ISO 27001 A.6.3

Awareness training and human-element control evidence. ISO 27001:2022 explicitly requires periodic phishing testing.

FCA / PRA Operational Resilience

Severe-but-plausible scenario evidence including human-element failure modes. SOC detection of social-engineering attempts.

NIS2 + DORA

Essential services and financial entities: human-element resilience is part of operational risk evidence.

SOC 2 Type II

CC1.4 entity values evidence (commitment to integrity), CC2.2 communication evidence: phishing assessments support both.

Cyber Essentials

Phishing readiness exceeds CE+ baseline and supports overall cyber maturity scoring during recertification.

NCSC Phishing Resistance

Aligned to NCSC phishing-resistance guidance: particularly important for FIDO2 hardware-key adoption recommendations.

TRANSPARENT PRICING

Transparent Phishing Assessment Pricing

All tiers include sector-specific threat profiling and SOC-coordinated delivery. Price varies by scope, channel breadth, and target population.

EMAIL CAMPAIGN
£3,000–£6,000
Depends on target population

Single-channel email phishing, ≤500 targets, sector-aware lures, basic SOC coordination. Typically 2-3 week delivery.

  • Free retests included
  • Free rescheduling
  • No cancellation fees
  • 24-hour scope to active testing
  • Live findings to client portal
  • Executive + technical report
  • 60-min walkthrough call
  • Letter of attestation
MOST COMMISSIONED
MULTI-CHANNEL
£6,000–£15,000
Depends on scope + channels

Email + vishing + smishing + OAuth phishing + MFA fatigue, ≤500 targets, full SOC coordination. Typically 3-5 week delivery.

  • Free retests included
  • Free rescheduling
  • No cancellation fees
  • 24-hour scope to active testing
  • Live findings to client portal
  • Executive + technical report
  • 60-min walkthrough call
  • Letter of attestation
ENTERPRISE / RED-TEAM ADJUNCT
£15,000+
Depends on scope + channels

All channels including physical pretext, full BEC scenarios, AitM testing, supply-chain phishing, integrated with red team or DORA TLPT cycle.

  • Free retests included
  • Free rescheduling
  • No cancellation fees
  • 24-hour scope to active testing
  • Live findings to client portal
  • Executive + technical report
  • 60-min walkthrough call
  • Letter of attestation

What You Actually Get

Five things that distinguish our service from automated scans and box-tick competitors.

🎯

What You Get From Phishing Assessment

Multi-channel adversary-mode campaign, sector-aware lure design, SOC detection metrics, cultural-gap analysis, executive briefing.
🤖

AI-Aware Lure Design

Modern phishing uses AI-generated content. Our lures match real-world adversary quality, not 2015-era Nigerian-prince templates.
🔬

OAuth + AitM Testing

MFA bypass via OAuth consent + Evilginx AitM. Tests modern attack patterns most awareness platforms cannot reproduce.
📊

SOC-Coordinated Metrics

SOC detection latency, ticket-queue triage quality, communication cascade: measured alongside user-side metrics.
🇬🇧

UK CREST + IASME + ISO 27001 + ISO 9001

Independently accredited. UK-based phishing operators. Reports accepted by FCA, NCSC, ISO auditors, and cyber insurers.

Frequently Asked

What is a phishing assessment?

A phishing assessment is a controlled simulation of phishing and social-engineering attacks against your organisation. Modern assessments go beyond email click-rate metrics to include vishing, smishing, OAuth consent phishing, MFA fatigue, and physical pretext attacks, measuring both user awareness and SOC detection.

How is your assessment different from a phishing-awareness platform?

Awareness platforms (KnowBe4, Proofpoint Security Awareness, etc.) deliver continuous low-fidelity phishing for training. Our assessment is adversary-mode: high-fidelity, sector-aware, multi-channel campaigns matching real threat-actor tradecraft. Use both: awareness platforms for ongoing training, our assessment for periodic resilience testing.

How long does a phishing assessment take?

Email-only campaign: 2-3 weeks (1 week setup, 1-2 weeks campaign). Multi-channel campaign: 3-5 weeks. Enterprise / red-team-adjunct campaign: 6-8 weeks including physical pretext component.

How much does phishing assessment cost in the UK?

Email-only £3,000-£6,000. Multi-channel (most commonly commissioned) £6,000-£15,000. Enterprise / red-team adjunct £15,000+. UK day rates for CREST + social-engineering specialists are £1,200-£1,800 per day.

Do you test MFA bypass via OAuth phishing?

Yes. OAuth consent phishing is the modern cloud account takeover vector: bypasses MFA entirely because the user grants legitimate-looking app permissions. Particularly effective against Microsoft 365 and Google Workspace tenants. Our assessment includes this if requested.

Do you test against MFA fatigue?

Yes. MFA-fatigue (push-notification spamming until the user accepts) is a real-world TTP behind the 2022 Uber breach and many subsequent incidents. We test MFA-bombing patterns, conditional-access policy effectiveness, and SOC detection of unusual MFA-prompt volume.

Do you do vishing (voice phishing)?

Yes. Vishing is particularly effective against help-desks, finance teams, and executive assistants. We deliver vishing as part of multi-channel campaigns: pretext development, recorded calls (where authorised), and post-campaign analysis of phone-handling resilience.

Do you do physical pretext attacks?

Yes, with extensive written authorisation. Physical pretexts include tailgating, USB drops, courier impersonation, RFID badge cloning, and dropbox-device deployment. Always paired with a “get-out-of-jail” letter for operators and pre-approved time windows.

Will phishing assessment damage employee trust?

No, when delivered well. We coordinate closely with HR and internal-comms teams. Post-assessment communications focus on collective improvement, not individual blame. Many of our clients see improved employee engagement on security topics after assessment.

Will assessments trigger our SOC?

Yes, by design. We coordinate with your SOC team to measure detection latency, triage quality, and communication cascade. SOC blue-team metrics are as important as user-side click-rate metrics. Some clients run “blind” SOC scenarios where the SOC team isn’t pre-warned.

Are your operators UK-based?

Yes, primarily UK-based with some international reach for specific language / regional coverage. SC-cleared operators are available for public-sector and regulated-financial engagements where vetting is required.

Do you sign NDAs?

Yes. Standard NDA before any threat-profile or target-list discussion. We operate under a project-specific master agreement that includes target-list IP protection, post-engagement data destruction, and white-team confidentiality.

READY TO SCOPE

Get a fixed Phishing Assessment quote in 24 hours

A CREST-certified social-engineering specialist will contact you within one business day with a fixed price, a realistic timeline, and the named consultant. No sales pipeline.