If phishing is meant to fool people, why do so many scam emails still read like they were written in a hurry?
For a long time, the answer was simple: scale.
Attackers blasted the same message to thousands of inboxes, linked to the same fake login page, and counted on a small percentage of people clicking. That model still exists. But it’s getting an upgrade.
The shift: from mass-produced to made-to-order
When generative AI hit the mainstream, a lot of people predicted “dynamic websites” for everyday business. The idea was that pages could be generated on demand, adjusting to your device, location, and behavior.
Most normal organizations never went down that road. It’s complicated, expensive, and rarely worth the engineering effort.
Cybercriminals are not aiming for elegant architecture. They just need believable.
Security researchers have already shown how phishing could borrow the dynamic website concept, even if it remains mostly experimental today. It’s a useful preview of where things can go.
What it can look like in the real world
Here’s the basic idea:
- Someone clicks a link in an email or text.
- The page that opens looks harmless at first glance. It may not contain a full fake login site sitting there waiting to be scanned.
- After the page loads, it calls a legitimate AI service to generate the pieces it needs.
- The content gets assembled inside the visitor’s browser and runs there.
End result: the phishing page is created for that specific visitor, at that specific moment.
The layout can change. The wording can change. Even the underlying code can vary from visit to visit. There’s no single, consistent “bad website” for defenders to fingerprint and block, because the scam is not fully formed until someone opens it.
That is the part that matters. Not the novelty, but the defensive headache.
Don’t panic, but don’t ignore it either
This is not the new normal for every attacker today. Most phishing is still basic because basic still works.
But the building blocks are already here:
- Scams are getting more personalized.
- Malware is increasingly assembled as it runs, which helps it slip past simple detection.
- AI is being used to speed up everything from convincing copy to messy scripting.
So while “made-to-order phishing pages” may not be everywhere yet, the direction is clear. The quality floor is rising.
What this changes for your business
For years, a lot of phishing advice boiled down to: “Look for bad grammar and weird formatting.”
That guidance is not useless, but it’s not enough.
The next wave of attacks will look cleaner. The email will read like a real coworker. The page will feel like a real vendor portal. And the pressure tactics will be subtle, not cartoonish.
If your security plan depends on people spotting obvious mistakes, you’re betting the business on everyone having a perfect day.
A more realistic approach is this: assume someone will eventually click, and focus on limiting what that click can do.
Practical defenses that still hold up
Even when a fake page looks professional, strong fundamentals make the attack harder to finish:
- Multi-factor authentication (or passkeys) everywhere it matters. Especially email, finance tools, admin portals, and remote access.
- Tighter sign-in controls. Things like conditional access, device compliance, and location rules reduce damage from stolen credentials.
- Email filtering and review routines. Your filters should catch more, and your team should have a quick way to report what slips through (a report phishing button helps a lot).
- Secure browsing. Browser isolation or hardened policies help when a page is trying to run tricks locally.
- Reduce impersonation risk. SPF, DKIM, DMARC, and ongoing email impersonation protection make it harder for attackers to look like you.
- Fast containment muscle. If an account gets hit, you need a plan to disable access, reset sessions, and confirm no forwarding rules or OAuth grants were added.
None of these require perfect humans. They assume humans are busy, and they build guardrails anyway.
The takeaway
Phishing is not going away. It’s getting smarter, cleaner, and more adaptive.
The goal is no longer “teach everyone to spot every scam.” The goal is “make a bad click survivable.”
If you want a quick, plain-English look at how exposed your business is, reach out and we’ll walk through it with you.