Understanding how attackers think reveals what effective training must address. Threat actors exploit three psychological triggers consistently: emotion, habit, and urgency.
Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft, explained this framework during the webinar: "If an email plays to your emotions, causes you to become in a heightened state of emotion. If it focuses on habit, something that you do every day... or if it pushes urgency. Looking for urgency, emotion, and habit is a really good way to determine if an email is potentially malicious."
These triggers bypass rational thinking. When someone receives a message claiming their account will be suspended in 24 hours, the urgency triggers System 1 thinking: fast, instinctive reactions that prioritize immediate action over careful analysis. Attackers know this, which is why credential phishing campaigns consistently use artificial deadlines.
Habit exploitation targets routine behaviors. Finance teams pay invoices daily because processing payments is exactly what employees are supposed to do. When attackers infiltrate a vendor management system through social engineering, they get legitimately entered as an authorized vendor.
From there, they can send invoices for months that get paid because they appear as a trusted supplier. This is precisely how vendor email compromise (VEC) attacks succeed. BEC accounted for $2.77 billion in reported losses, demonstrating why these habit-based attacks remain so lucrative for threat actors.