Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Human error, psychology and specificity: The power of spear phishing

By Zack Allen
phishing-email-freepik.jpg
October 11, 2021

The threat landscape continues to expand with an expediential rise in pandemic-related phishing campaigns targeting companies, governments, and individuals. The Federal Bureau of Investigation (FBI) recently issued a notification warning of an ongoing phishing campaign attempting to steal corporate accounts and credentials for network access and privilege escalation from U.S. and international-based employees. With the remote workspace as the new norm, there has been an increased use of corporate VPNs and elimination of in-person verification – allowing cybercriminals to gain access to employee tools at multiple companies with indiscriminate targeting.


While there are many different forms of phishing attacks, spear phishing is the most tried and true phishing method. In this piece, we’ll dive into what spear phishing is and how security teams can effectively tackle this very targeted method of digital attack, especially now that hackers are picking up their pace. 


Spear Phishing vs. Phishing

Spear phishing is a method of attack that involves targeting specific users with tailored phishing content under the guise of a known contact. What makes spear-phishing different from traditional phishing attacks is the targeting. Phishing campaigns tend to be broad in scale, with multiple targets offering more opportunities for security teams to identify the attack.


While the goal of a spear-phishing attack is similar to any phishing attack - to gain access to internal networks, steal credentials or information, and/or infect devices with malware - what makes it so effective is the reliance on human error, psychology and specificity. Attackers conduct in-depth research into targets to choose the perfect sender to spoof, message to send and associated call to action. Relying on a combination of platforms from email, social media, domains and more, spear-phishing attacks are complex and effective, making them difficult to identify and thwart. The attacker’s goal is to create a believable depiction of the organization or its top leaders to fool its customers and even its employees into believing they are engaging with the legitimate sender. 


While spear phishing can occur through email, social media or other means, one common example that has risen dramatically in recent years is business email compromise (BEC) attacks. Business email compromise involves the impersonation of a high-profile figure, such as an executive at the company. Attackers will leverage a CEO’s name to create a look-alike email address and send employees spear-phishing emails with requests for wire transfer, sensitive data, or click on a link. At the individual scale, IT teams are much more reliant on the user to recognize the attack. The increased sophistication of these attacks, through methods such as business email compromise, make spear phishing even harder to detect with traditional tools. 


Financial Costs of Spear Phishing

Most scammers’ ultimate goal is to siphon revenue from the targeted organization through gift card scams or direct bank transfers. Organizations whose employees frequently deal with transferring funds, such as financial services, should be especially careful of spear-phishing attacks as they are prime targets. While most gift card-related attacks reported by the APWG Phishing Activity Trends Report were in the $1,000 range, wire transfer requests remain much higher, with an average request of $48,000 in Q3 2020. For small to midsize companies, a single email-based attack could have lasting financial costs on the organization.


How to Defend Against Spear Phishing Attacks

All security teams should be concerned with spear-phishing due to its effectiveness in reaching critical targets within the organization. With thousands of emails and social media messages sent each day, it can be difficult to identify spear-phishing attacks at scale, but a single attack can have lasting damage on an organization if sensitive information or significant funds are stolen.


Because attackers rely on a combination of platforms for reconnaissance, attack planning and execution, it’s critical for security teams to have visibility across external platforms. Understanding your organization and its high-profile employees’ social media presence is critical since attackers often leverage public information on social media to build convincing profiles to conduct attacks. Multi-channel spear phishing can also include creating impersonating accounts on social media as another means of reaching target audiences. Quickly identifying and removing any sensitive information that is shared publicly on social media or elsewhere on the web, including personal information, travel plans, credentials and more, is critical to stop the spread of a spear-phishing campaign. 


As spear-phishing campaigns become more sophisticated, traditional email security methods such as blocking and deleting phishing emails will be insufficient and more sophisticated anti-phishing software will be necessary. Rather than addressing phishing attacks at the individual email level, working with domain registrars and hosts to dismantle the infrastructure behind those email addresses not only stops the specific attack but prevents future attacks from leveraging that same domain. 

KEYWORDS: business email compromise (BEC) cyber security risk management spear phishing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zack Allen is Senior Director of Threat Intelligence at ZeroFOX.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 95% of Successful Security Attacks are the Result of Human Error

    See More
  • The Long and Winding Road to Cyber Recovery

    Human error poses cybersecurity challenges for 80% of businesses during the COVID-19 pandemic

    See More
  • industrial

    Human Error Caused 52 Percent of Cybersecurity Incidents in the Industrial Sector in 2018

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • The Database Hacker's Handboo

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing