White Paper

Spear Phishing: Carefully Targeted, Extremely Damaging and Fast Increasing

FTI

It’s a depressingly familiar experience – a message pops into the recipient’s inbox demanding that they log-in to their bank account, office systems or email provider urgently. Badly written, often featuring a generic salutation ("Dear Valued Customer") and frequently purporting to be from a bank or other organisation that the recipient is not even a customer of, most of these messages are instantly deleted.

But what about the message that seems more authentic and relevant `to the recipient? It might not feel right but would a fraudster go really take the trouble to get so many details right – referring to their bank, their employer, their location and perhaps even a colleague? The practice of sending fraudulent emails that, unlike most phishing activity, contain precise and usually factually correct details, is known as “spear phishing.” Just as a real-life spear fisher targets a particular fish, the electronic variety goes for specific individuals, creating fraudulent emails that look more genuine and convincing than the general phishing variety.

Rather than attempt to train staff to be alert for both regular and spear phishing separately, organisations should talk to them about factors such as classic influence techniques – these include messages with themes of urgency, threat and authority. These themes are common to both spear and ordinary phishing emails.

As spear phishing becomes sophisticated and widespread it’s essential that organisations take a multi-layered approach to protecting themselves. This means buying in expertise in staff training, cyber security and monitoring from an external source that specialises in this growing risk.

Related topics:

To download this white paper please register using the form below.

I would like to receive news about FTI Technology resources or invitations to special events. You can withdraw your consent to receive emails from us at any time. Please refer to our privacy policy or contact us for more details.

Complete the required fields

Thanks for registering. Use the button below to download the white paper.

Download the PDF