Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Definition: Spear-Phishing

February 17, 2015 by The T By D Team 4 Comments

Spear-Phishing:

 

A targeted email scam with the sole purpose of obtaining unauthorized access to sensitive data.

 

 

 

Unlike phishing scams, which case broad, scatter-shot attacks, spear phishing hones in on a specific group or organization.  The intent is to steal intellectual property, financial data, trade or military secrets and other confidential data.

 

Victims are 4.5 times more likely to fall for spear-phishing email scams than normal phishing scams.  

 

This Is How It Works:

An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware.  The malware infects that person’s computer.  If that person is connected to a network, or server, the CyberCriminals that sent the email now have access to the server and/or network, and all it’s information and data it/they contain.

These emails often use clever tactics to get victims’ attention.  For example, the FBI has warned of spear phishing scams where the emails appeared to be from the National Center for Missing and Exploited Children.

Many times, government-sponsored hackers and hacktivists are behind these attacks.  CyberCriminals do the same with the intention to resell confidential data to governments and private companies.  These CyberCriminals employ individually designed approaches and social engineering techniques to effectively personalize messages and websites.  As a result, even high-ranking targets within organizations, can find themselves opening emails they thought were safe.

 

One of the main entry points for Advanced Persistent Threats.

How To Stop It:

Traditional security often does not stop these attacks.  They are so cleverly customized, and are becoming more and more difficult to detect.

To fight spear-phishing scams, employees need to be aware of the threats.
Employees need to be aware of the possibility of bogus emails landing in their inbox, and what to look for.  

One employee mistake can have serious consequenses for businesses, financial institutions, governments, and even non-profit organizations.  With stolen data, CyberCriminals can reveal commercially sensitive information, manipulate stock prices, or commit various acts of espionage.

Spear-phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.
Technology that focuses on email security is an absolute necessity.

 

 

Filed Under: Definitions

Trackbacks

  1. ALERT: A $46 Million CyberHeist, and Why You Should Care says:
    August 10, 2015 at 9:31 am

    […] […]

    Reply
  2. FAQ: CyberSecurity – What, Me Worry? says:
    August 12, 2015 at 12:54 pm

    […] Pentagon has divulged that its computer networks were penetrated by suspected Russian hackers using spear-phishing tactics.  The hackers got into their unclassified email network used by the Joint Chiefs of Staff […]

    Reply
  3. Definition: Like-Farming Scams says:
    September 9, 2015 at 11:24 am

    […] list of followers can be used by the CyberCriminals for further spear-phishing, or sold to other CyberCriminals for their spamming use, or to marketing […]

    Reply
  4. ALERT: Drowned Syrian Boy Scams - Technology by Design says:
    October 28, 2015 at 6:50 am

    […] or “shares” etc.  The list of followers can be used by the CyberCriminals for further spear-phishing, or sold to other CyberCriminals for their spamming use, or to marketing […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in