What is spear phishing
Last updated: April 1, 2026
Key Facts
- Spear phishing targets specific individuals or organizations with customized, personalized messages unlike generic phishing campaigns
- Attackers extensively research targets using social media, company websites, and public records to create convincing impersonations
- Spear phishing emails appear to come from trusted sources such as banks, employers, colleagues, or business partners
- Successful spear phishing attacks result in identity theft, financial fraud, corporate data breaches, and compromised security systems
- Spear phishing requires significantly less volume than traditional phishing but achieves substantially higher success rates due to personalization and trust exploitation
Definition and Characteristics
Spear phishing is a highly targeted form of cyberattack combining social engineering with impersonation techniques. Unlike traditional phishing that sends generic emails to thousands of people hoping for minimal success, spear phishing focuses on specific individuals or small groups. Attackers craft personalized messages that appear legitimate, leveraging details about the target to establish false credibility and trust.
Attack Methodology
Successful spear phishing attacks follow a deliberate process. Attackers typically:
- Research targets extensively using LinkedIn profiles, company websites, and social media to gather personal details, job titles, and relationships
- Identify valuable information sources or decision-makers likely to have access to sensitive data
- Create convincing email addresses and signatures that closely mimic legitimate organizational accounts
- Craft personalized messages referencing specific projects, colleagues, or circumstances to establish credibility
- Include urgent language creating time pressure that reduces careful review
- Request sensitive information like passwords, financial data, or access credentials
- Alternatively, direct recipients to malicious links or attachments containing malware or keyloggers
Common Targets and Scenarios
Organizations in finance, healthcare, government, and technology sectors face heightened spear phishing risk due to valuable data access. Common scenarios include impersonating executives requesting wire transfers (CEO fraud), IT departments requesting password resets, or vendors requesting updated payment information. Healthcare spear phishing may impersonate patient portals or insurance providers.
Consequences of Successful Attacks
Spear phishing breaches can be catastrophic. Individual victims face identity theft, financial fraud, and compromised personal accounts. Organizations experience data breaches exposing customer information, intellectual property theft, financial fraud, ransomware infections, and disrupted operations. High-profile spear phishing attacks have compromised government agencies, Fortune 500 companies, and critical infrastructure systems.
Prevention and Response
Organizations implement multi-layered defenses including employee security training, email authentication protocols (SPF, DKIM, DMARC), advanced email filtering, and multi-factor authentication on critical systems. Individuals should verify unexpected requests through independent communication channels, scrutinize sender addresses carefully, and avoid clicking links in unsolicited emails. Reporting suspected spear phishing to IT security and email providers helps protect broader communities.
Related Questions
How is spear phishing different from regular phishing?
Spear phishing targets specific individuals with personalized, research-based messages, while regular phishing sends generic emails to massive recipient lists. Spear phishing achieves much higher success rates but requires more attacker effort per target.
What is CEO fraud and how is it related to spear phishing?
CEO fraud is a spear phishing attack where scammers impersonate company executives requesting urgent wire transfers or sensitive employee data. It exploits organizational hierarchy and authority to convince finance staff to bypass normal verification procedures.
Can spear phishing be prevented entirely?
Complete prevention is difficult, but multi-factor authentication, email verification protocols, employee training, and skepticism about unexpected requests significantly reduce success rates. Security layers and employee awareness are most effective defenses.
More What Is in Daily Life
- What Is a Credit ScoreA credit score is a three-digit number, typically ranging from 300 to 850, that represents your cred…
- What Is CD rates make no sense based on length of time invested. Explain like I'm 5CD (Certificate of Deposit) rates often don't increase with longer lock-up times the way people expe…
- What is a phdA PhD (Doctor of Philosophy) is a doctoral degree earned after completing advanced academic research…
- What is a polymathA polymath is a person with deep knowledge and expertise across multiple different fields or academi…
- What is aaveAAVE stands for African American Vernacular English, a dialect with distinct grammar, pronunciation,…
- What is aarch64ARMv8-A (commonly called ARM64 or AArch64) is a 64-bit processor architecture developed by ARM Holdi…
- What is about menTopics and discussions about men typically encompass masculinity, male identity, gender roles, men's…
- What is abiturAbitur is the German academic qualification awarded upon completion of secondary education, typicall…
- What is abrosexualAbrosexual is a sexual orientation identity where a person's sexual attraction changes or fluctuates…
- What is abgABG is an Indonesian acronym standing for 'Anak Baru Gede,' which refers to adolescent girls or teen…
- What is aaaAAA batteries are a standard cylindrical battery size measuring 10.5mm in diameter and 44.5mm in len…
- What is aacAAC (Advanced Audio Codec) is a digital audio compression format that provides better sound quality …
- What is aaa gameAAA games are high-budget video games developed by large studios with budgets typically exceeding $1…
- What is a proxyA proxy is a server that acts as an intermediary between your device and the internet, forwarding yo…
- What is ableismAbleism is discrimination and prejudice against people with disabilities based on the assumption tha…
- What is absAbs, short for abdominal muscles, are the muscles in your core that flex your spine and stabilize yo…
- What is abortionAbortion is a medical procedure that ends pregnancy by removing the fetus before viability. It can b…
- What is accutaneAccutane (isotretinoin) is a powerful prescription medication derived from vitamin A used to treat s…
- What is acetaminophenAcetaminophen, also known as paracetamol, is an over-the-counter pain reliever and fever reducer use…
- What is acidAcid is a chemical substance that donates protons (hydrogen ions) to other substances, characterized…
Also in Daily Life
- How To Save Money
- Why are so many white supremacist and right wings grifters not white
- Does "I'm 20 out" mean youre 20 minutes away from where you left, or youre 20 minutes away from your destination
- Why are so many men convinced that they are ugly
- What does awol mean
- What does asl mean
- What does ad mean
- What does asap mean
- What does apex mean
- What does asmr stand for
- What does atp mean
- What causes autism
- What does abg mean
- What does am and pm mean
- What does a fox sound like
More "What Is" Questions
Trending on WhatAnswer
Browse by Topic
Browse by Question Type
Sources
- Wikipedia - Phishing CC-BY-SA-4.0
- Cybersecurity and Infrastructure Security Agency - Phishing Resources Public Domain
- Federal Trade Commission - Consumer Protection Public Domain