What is Spear Phishing?
Spear phishing is a highly targeted form of phishing aimed at specific individuals or small groups. Attackers research their targets, reference real relationships, and personalize messages so convincingly that standard anti-phishing filters and generic training often miss them.
How Spear Phishing works
Three-step view of how it operates in practice.
Reconnaissance
The attacker studies LinkedIn, public press, your website, and social media to build a profile of the target and their relationships.
Pretext
A plausible scenario is crafted — a referenced meeting, a mutual contact, a project in flight. The pretext is what makes the message believable.
Execute
The message arrives with a link to a credential-harvesting site, a malicious attachment, or a fraudulent request for action.
Targets attackers prefer
A clear breakdown of the common variants.
Executives
High signing authority, broad inbox access, often skip security reviews. Called whaling.
Finance & AP
Time-based one-time codes from an app like Microsoft Authenticator or Google Authenticator. Offline-capable and phishing-resistant against many attacks.
HR
The user approves a sign-in with a tap on their phone. Easy to use but vulnerable to MFA fatigue attacks — always pair with number matching.
IT admins
FIDO2 keys like YubiKey, or device-bound passkeys. Phishing-resistant by design — the key will not authenticate against a fake domain.
Why Spear Phishing matters for SMBs
Spear phishing is a highly targeted form of phishing aimed at specific individuals or small groups.
Common Spear Phishing mistakes
- Assuming training alone catches spear phishingThe best spear phishing looks indistinguishable from real email. Technical controls (MFA, sandboxing, anomaly detection) matter more.
- No email sender authAdmins, finance, and anyone with access to money or sensitive data should use an app or hardware key — never SMS alone.
- Ignoring lookalike domainsTypo-squatted domains (rnicrosoft.com, lo9ical.net) are still widely used. Monitor for lookalikes targeting your brand.
- Exec accounts with weak MFAExecutives often resist stronger MFA ("I’m busy"). They’re target #1 — this is where phishing-resistant MFA belongs first.
Spear Phishing frequently asked questions
LogicalNet services related to MFA
Related glossary terms
Executives getting targeted?
Talk to a LogicalNet identity expert. We will review your current environment, recommend the right MFA methods for each group of users, and help you deploy without disrupting the business.