Spear phishing is a targeted attack. Instead of blasting the same email to everyone, attackers tailor the message to a specific person, team, or workflow—finance approvals, vendor payments, HR requests, or “IT sign-in” prompts.
The customization is the weapon: real names, job titles, recent projects, and believable context. The message often feels “normal” because it matches how your business already works—and that’s exactly why it can bypass quick gut checks.
A good defense is less about spotting typos and more about repeatable verification: confirm identity, inspect destinations at click time, and make reporting easy so the same lure doesn’t spread.
- travel_explore Research: collect names, vendors, org charts, and common approval paths.
- mail Pretext: craft a believable story (“invoice update”, “shared file”, “urgent approval”).
- domain Impersonation: use look‑alike domains, display-name tricks, or hijacked threads.
- gpp_maybe Pressure: add urgency and minimize verification (“do not call”, “confidential”).