An Introduction to Spear Phishing – Part 1


As we know it today, phishing has become one of the most commonly used tactics by the cyber attacker in order to garner personal information and data.

This primarily involves our physical addresses, e-mail addresses, credit card numbers, banking and other types and kinds of financial information, social security numbers, etc. (sometimes called Personally Identifiable Information, or PII).

Phishing involves sending an e-mail, either with a malicious file (such as those .DOC and .XLS), or link.

Once the victim has downloaded the files or clicked on the link (or perhaps even both), then the malware (most likely a Trojan Horse) then spreads itself onto the computer or wireless device of victim.

Generally phishing attacks involve sending mass e-mails out to a lot of people – in other words, there is not one targeted individual or organization.

Whatever contact information the cyber attacker can get their hands on is used. Lately, however, there appears to be a new trend developing – a tactic known as “Spear Phishing.”

Spear Phishing Defined

It can be defined specifically as follows:

“It is a phishing method that targets specific individuals or groups within an organization. It is a potent variant of phishing, a malicious tactic which uses emails, social media, instant messaging, and other platforms to get users to divulge personal information or perform actions that cause network compromise, data loss, or financial loss.”


Thus, in these instances, the cyber attacker has already done their research ahead of time and knows who or what they want to specifically target. This is actually a wee bit scarier already.

In a way, this is similar to that of Business E-Mail Compromise (BEC) attack, in which the C-Level executive is primarily targeted to transfer funds.

In this post, we examine the recent trends of spear phishing attacks.

The Trends

Here are some alarming statistics to consider and be aware of:

> 77% of the spear phishing attacks are laser focused – targeting only 10 e-mail inboxes, and only 33% of them focused upon just one e-mail inbox.

> 47% of spear phishing attacks lasted less than 24 hours. All other types of phishing schemes lasted at least 30 days or more.

> Another tactic that the cyber attacker uses is what is known as the “Drip Campaign”. For example, 35% of the spear phishing attacks lasted at least 12 months or even longer.

> The cyber attacker has become even stealthier when it comes to bypassing the e-mail spam filters. In these instances, 20% of spear phishing based e-mails were able to get around these filters, and their way into the inbox.

> 42% of IT security professionals consider spear phishing to be amongst one of the top 3 cyber-attack concerns.

> At least 30% of the spear phishing campaigns are deemed to be successful.

> Compared to a general phishing campaign, spear phishing campaigns cost 20X per victim, and the return is 40X greater.

> A cyber attacker will spend an enormous amount of time also trying to find a hidden “crack” or “hole” in the organization in as a stepping stone to collect the relevant information/data on their victim.

A Deeper Look

So how is that the cyber attacker is so successful when launching these kinds of campaigns?

First, they are consistently sharpening and refining their skills in conducting the research needed in order to launch a laser focused attack.

Second, the cyber attacker doesn’t rely upon the fancy technology in order to execute a spear phishing campaign. Rather they rely upon the old the old-fashioned techniques of social engineering in which to thrust their attacks forward.

The cyber attacker demonstrates a considerable amount of patience.

For instance, they spend an enormous of time researching their primary target. They are in no rush to get this task accomplished.

The more accurate the information that they have, the greater the statistical probability that their well-crafted e-mail will make it through the spam filters.

They often rely upon social media sites that the individual or even the organization uses.  They try to glean as much contact information as possible.

Also, the use of Internet based background searches is a commonly used tool as well.

Next Steps

Our next post of this series will examine the specific areas of interest that a cyber attacker targets in their spear phishing campaigns.

Facebook Comments


Please enter your comment!
Please enter your name here