Spear Phishing in Action

Published On: February 17th, 2021Categories: Business Software, Business Technology, Cyber Security, Tech Case Studies, Tech Trends

Unlike traditional phishing scams that are usually sent at random from an aggregated list, spear phishing targets specific people. In this attack, the scammer researches the target to gather as much information as possible, such as place of work, job title, and any personal details available to the public. They then use this information to gain and abuse the victim’s trust, sometimes posing as a co-worker, friend, or even law enforcement.

Below is an example of what a spear phishing email might look like. How would you know this was a scam?

  • Example of a spear phishing threat to cybersecurity.
  • Three reasons to suspect a spear phishing attack.
  • Steps to follow when receiving suspicious emails.

Share This Story, Choose Your Platform!

About the Author: Eric Vicencio

Eric began his career in healthcare, and he has been working in the IT field since 2006 when he graduated from Northern Illinois University. Eric specializes in Infrastructure, SQL and compliance: Licensing, HIPAA, GLBA and PCI.