Skip to main content

What is Spear Phishing?

Imagine two fishermen catching fish on a lake. One is throwing a net and is catching a variety of fish, most of them small. Maybe he catches something big enough, but maybe not. 

The other fisherman, on the other hand, has a different approach. Instead of casting a net in the lake without much planning and hoping that he catches something useful to bring home to dinner, he brings a fishing rod with him. He even has a special bait because he doesn’t want to catch just any fish. He wants a particular one. A big one.

Who do you think will eat better that evening?

What is the Difference between Regular Phishing and Spear Phishing?

This, in essence, is the difference between phishing and spear phishing.

In 2012, according to Trend Micro, over 90% of all targeted cyber attacks were spear-phishing related.

In regular phishing, the hacker sends emails at random to a wide number of email addresses. Just like our first fisherman friend with his net. 

And, just like the fisherman number one, the hacker doesn’t have very high hopes of catching a very big fish. He might catch a few smaller ones, but usually nothing to write home about.

How Does Phishing Work?

So how does a “regular” phishing attack work?

You probably received a phishing email a few times in your inbox. Usually, they appear like a legitimate business sent them. For example, you might get an email from your bank, internet service provider, or mobile carrier telling you that you need to login to your account because of some security breach or unscheduled maintenance.

There’s even a link you can click to get to the website and log in. When you click the link it will send you to a website page that looks almost identical to the one from the real bank.

Everything looks legitimate, so you go to the login page and type your username and password. Unfortunately, you realize too late that both the email and website were fake and created by the hacker to steal your account information so he can use them later.

For instance, the hacker can sell your login information on a black market on the dark web or use the information himself to hack your account and steal your money.

The “Problem” with Regular Phishing and How Spear Phishing Solves it

Phishing, as you can see, is very simple in both theory and practice. The problem, at least for the hacker, is that it is too random. Some get caught by it, some don’t, but there’s also no guarantee for the hacker that he’ll catch anything good. For instance, the hacker might send the email to someone who isn’t a client of that bank. 

Why would a bank that you’re not a client be sending you emails?

Most likely, you would just immediately hit the delete button on that email and forget all about it in two seconds.

The problem with phishing is that it’s not incredibly well-targeted. 

However, what if you get an email that addresses you by name, knows where you work, your company title and some other information that your real bank would know?

You would be much more inclined to open that email and respond to it, right?

That’s what a hacker using the spear phishing tactic does. He’s like the fisherman that knows what kind of bait to bring to catch a specific fish because he did his homework. 

Yes, he’ll only catch one fish or victim, but it’s going to be a big one and he has a  much better chance of catching it than a hacker trying with a normal phishing attack.

How to Protect Your Email Against Spear Phishing Attacks?

According to Symantec’s Internet Security Threat Report from 2019 (PDF), spear phishing emails are used by 65% of all known cybercrime groups as their primary mode of attack.

As you can see, spear phishing attacks are nothing to scoff at and take lightly. Companies lose millions of dollars because of it. For instance, ProofPoint’s 2020 “State of the Phish” survey found that 90% of all organizations that participated in the survey faced a spear phishing attack in 2019.

So what can you do to prevent the same from happening to you and to protect your email from a spear phishing attack?

The number one thing to do is to encrypt your important and sensitive information and emails.

There are a few things that you can (and probably should) encrypt):

  • Your hard drive.
  • Passwords for your online accounts.
  • Internet activity (you can use a VPN or mask your IP address).
  • External storage such as USB or hard disc drives
  • Important files. Here’s how to send documents securely over the net by the way.

But the most important thing to encrypt, however, is your email communication. If a hacker manages to intercept your in-house emails with coworkers and employees or with clients revealing sensitive information about you and your company, that can cause a lot of problems for you.

So what’s the solution? 

The solution is to use a secure encrypted email service like CTemplar that will protect your emails both in transit and at rest from any hacker. 

CTemplar is an anonymous armored email that uses the strongest available, 4096-bit OpenPGP encryption to protect your emails and give you the piece of the mind while emailing. 

CTemplar also offers several other security features, including the strongest anti-phishing protection around. You can set up a phrase to be shown in your account that will alert you to any phishing attempts and prevent you from getting hooked.

Comments

Popular posts from this blog

How to hack wifi in Windows 7/8/8.1/10 without any software | using with cmd

How to Hack Wifi password using cmd Hello Friends, In this article we will share some tricks that can help you to hack wifi password using cmd. Youcan experiment these trick with your neighbors or friends. It’s not necessarily that this trick will work with every wifi because of upgraded hardware. But you can still try this crack with wifi having old modems or routers. 1: WEP: Wired Equivalent Privacy (WEP) is one of the widely used security key in wifi devices. It is also the oldest and most popular key and was added in 1999. WEP uses 128 bit and 256-bit encryption. With the help of this tutorial, you can easily get into 128-bit encryption and Hack WiFi password using CMD. 2: WAP and WAP2: Wi-Fi Protected Access is an another version of WiFi encryption and was first used in 2003. It uses the 256-bit encryption model and is tough to hack. WAP2 is an updated version of WAP and was introduced in 2006. Since then it has replaced WAP and is now been used mostly in offices and colleges w

സുമതിയെ കൊന്ന വളവ് | The real Story of Sumathi valavu

സുമതി വളവ്.. മൈലമൂട് സുമതിയെ കൊന്ന വളവ് എന്ന് കേട്ടാല്‍ കേള്‍ക്കുന്നവരുടെ മനസ്സ് അറിയാതൊന്ന് കിടുങ്ങുന്നകാലമുണ്ടായിരുന്നു .അത്ര കണ്ട് ഭയമാണ് ഈ സ്ഥലത്തെക്കുറിച്ച് നാട്ടുകാരുടെ മനസ്സില്‍ഒരു കാലത്ത് ഉണ്ടായിരുന്നത്. അറുപത് വര്‍ഷം മുമ്പ് കൊല ചെയ്ത സുമതിയെന്ന ഗര്‍ഭിണിയായ യുവതിയുടെ ആത്മാവ് ഗതി കിട്ടാതെ ഇവിടെ അലഞ്ഞ് തിരിഞ്ഞ് നടക്കുന്നുവെന്ന വിശ്വാസമാണ് ഭയത്തിന് കാരണം. തിരുവനന്തപുരം ജില്ലയില്‍ കല്ലറ പാലോട് റോഡില്‍ മൈലമൂട്ടില്‍ നിന്നും അര കിലോമീറ്റര്‍ ദൂരെ വനത്തിനുള്ളിലെ കൊടും വളവാണ് സുമതിയെ കൊന്ന വളവ് എന്ന സ്ഥലം. ഇവിടെ വച്ചാണ് സുമതി കൊല്ലപ്പെട്ടത്. വനപ്രദേശമായതിനാല്‍ സന്ധ്യ മയങ്ങുമ്പോള്‍ തന്നെ ഇരുട്ടിലാകുന്ന സ്ഥലമാണിത്. ഇടതിങ്ങി വളര്‍ന്ന് നില്‍ക്കുന്ന മരങ്ങളുള്ള റോഡില്‍ ഒരുവശം വലിയ ഗര്‍ത്തമാണ്.ഒപ്പം കാടിന്റെ വന്യമായ വിജനതയും. ഇതിനൊപ്പം പൊടിപ്പും തൊങ്ങലും വച്ച് പ്രചരിയ്കുന്ന കഥകള്‍ കൂടിയാകുമ്പോള്‍ എത്ര ധൈര്യശാലിയായാലും ഈ സ്ഥലത്തെത്തുമ്പോള്‍ സുമതിയുടെ പ്രേതത്തെക്കുറിച്ച് അറിയാതെയെങ്കിലും ഓര്‍ത്ത് പോകും.പ്രത്യേകിച്ചും രാത്രി കാലങ്ങളില്‍. സുമതി മരിച്ചിട്ട് ഇപ്പോള്‍ അറുപത് വര്‍ഷം കഴിഞ്ഞു. എന്നിട്ടു

A Beginner’s Guide to Getting Started with Bitcoin

A man looks for Bitcoin Oasis If you have heard about blockchain or cryptocurrency, then the term that initially comes to mind is Bitcoin . Launched 12 years ago, it was the late 2017 bull run that created a media frenzy that propelled Bitcoin into the mainstream and our modern day lexicon. Often labeled as the “original” cryptocurrency, Bitcoin has been the catalyst (directly and/or indirectly) behind many new innovations in the blockchain and digital asset space, most notably Ethereum and Monero . Shortly after the late 2017 bull run lost its steam, interest in these new technologies started to fade ― but here we are in 2021 with Bitcoin having risen like a phoenix from the ashes. As you would assume, an appetite for the blockchain and digital asset space has returned and now it is more important than ever that we understand what exactly is behind this unique asset, Bitcoin. This article is meant to be a guide for individuals who are new to cryptocurren