Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Social Engineering Glossary

Spear-Phishing

A targeted phishing attack aimed at a specific person or organization—tailored with personal details, colleagues' names, and current context. Significantly more effective than generic phishing and harder to detect.

Spear phishing is a targeted form of phishing. While generic phishing sends out millions of emails with identical content and relies on statistical probability, spear phishing tailors each attack individually.

Generic Phishing vs. Spear Phishing

Generic PhishingSpear Phishing
Target audienceAny email addressesSpecific person(s)
ContentGeneric ("Your account will be suspended")Personalized with real details
EffortMinimalHours to days of research
Click-through rate5–30%50–70% with good context
DetectionEasier (obvious red flags)Very difficult

How Attackers Prepare Spear Phishing Attacks

OSINT Phase (Open Source Intelligence):

Attackers gather information from public sources:

  • LinkedIn: Name, title, department, colleagues’ names, current projects, technologies
  • Company website: Organizational chart, news, current job postings, partnerships
  • XING, Twitter/X: Professional interests, conference attendance
  • Press releases: M&A activities, new partnerships, leadership changes
  • GitHub: Technologies, code comments with internal hostnames
  • Google: Employee names from old presentations, internal documents

Pretext Development:

A credible story is constructed using the collected information:

  • "Hello [First Name], I’m [real colleague’s name] from the IT department. I need your quick confirmation regarding our Microsoft 365 migration project..."
  • "Regarding our collaboration with [real partner company]—can you approve this invoice?"
  • Fake email from the "CEO" with internal project context

Whaling - Spear Phishing at the Executive Level

Whaling refers to spear-phishing specifically targeting executives (CEO, CFO, CISO). These attacks are particularly valuable to attackers because:

  • Executives have decision-making authority over transactions
  • Their authority is exploited for CEO fraud
  • They have access to highly sensitive information

Whaling emails typically masquerade as:

  • Summonses from government agencies or courts
  • Tax inquiries from the IRS
  • Business inquiries from investors or major clients
  • Confidential merger discussions

Protective Measures

Technical:

  • DMARC/DKIM/SPF prevents email spoofing of your own domain
  • Anti-phishing filters in the email gateway (detects lookalike domains, DKIM anomalies)
  • Multi-factor authentication (prevents account takeover even if credentials are compromised)
  • FIDO2/Passkeys for phishing-resistant authentication

Procedural:

  • Mandatory verification for payment requests via a second channel (callback)
  • Dual-control principle for transfers exceeding a threshold
  • Do not click on links in unexpected emails—enter the URL directly

Awareness:

  • Spear-phishing simulations with real-world context (colleagues’ names, current projects)
  • Training specifically targeting executives (CEO fraud scenarios)
  • Reporting suspicious emails without fear of consequences

Spear Phishing as an APT Entry Vector

State-sponsored attackers (APTs) systematically use spear phishing as an initial entry vector:

  • Months-long OSINT phase with detailed profiling of the target
  • Tailored malware in seemingly harmless attachments (Word document, PDF)
  • Zero-day exploits in attachments for maximum undetected access

The BSI and CISA regularly report on state-sponsored spear-phishing campaigns targeting government agencies, defense contractors, and research institutions in Germany.