Fundamentals

What Is Spear Phishing? The Targeted Attack That Bypasses Every Technical Control

> attack_class: social engineering —— vector: targeted email —— success_rate: highest of any initial access technique —— defence: technology + human judgement —— status: the threat that never goes away<span class="cursor-blink">_</span>_

Hedgehog Security 9 October 2024 24 min read
spear-phishing social-engineering phishing initial-access email-security threat-intelligence apt credential-theft mitre-attack security-awareness

The attack that is written specifically for you.

A finance director receives an email from what appears to be the company's CEO. The email references a real acquisition the company is pursuing — one that has not been publicly announced. The tone matches the CEO's writing style: terse, direct, no pleasantries. The email asks the finance director to process an urgent wire transfer to a solicitor handling the deal, and includes a PDF attachment with the payment details. The email address is one character different from the CEO's real address — an 'rn' where an 'm' should be, invisible at a glance. The PDF contains a link to what appears to be a secure document portal. The portal is the real Microsoft 365 login page, relayed through an adversary-in-the-middle proxy that captures the finance director's credentials and authenticated session token the moment they sign in.

This is spear phishing. Not a bulk campaign sent to ten thousand inboxes hoping someone clicks. A targeted, researched, personally crafted attack directed at a specific individual, using information gathered about them, their organisation, their role, and their current activities to create a pretext that is almost indistinguishable from legitimate communication. The attacker knew the target's name, their position, their CEO's name and writing style, the existence of an undisclosed acquisition, and the email format the organisation uses. All of that intelligence was gathered before a single email was composed.

Spear phishing is the most common initial access vector used by advanced threat actors — state-sponsored and criminal alike. APT1 used it to compromise 141 organisations across 20 industries over a decade-long campaign. APT35 used it to target journalists and academic researchers studying Iranian policy, building rapport over weeks before delivering payloads. APT42 created elaborate fake personas and maintained months-long email correspondence before sending a single malicious link. Scattered Spider used it alongside helpdesk social engineering and MFA fatigue to breach MGM Resorts and Caesars Entertainment. LAPSUS$ used it as the first step in compromising Uber. The Picus Red Report 2026 documents that credential theft now features in nearly one in four attacks — and spear phishing is the primary method by which those credentials are harvested. The technique has persisted for over two decades not because defenders lack technology, but because it exploits the one vulnerability that cannot be patched: human trust.


Phishing versus spear phishing — volume versus precision.

The terms are often used interchangeably, but the operational difference between bulk phishing and spear phishing is enormous — and understanding it is essential for defence, because the controls that stop one are largely ineffective against the other.

Characteristic Bulk Phishing Spear Phishing
Target Selection Untargeted. Sent to thousands or millions of addresses harvested from breaches, scraping, or purchased lists. The attacker does not know or care who the recipients are. Specifically selected individuals chosen for their role, access, or authority within a target organisation. The attacker has researched the target before composing the email.
Personalisation Generic. 'Dear Customer', 'Your account has been suspended', 'Invoice attached'. No personalisation beyond perhaps the recipient's name pulled from a data set. Highly personalised. References the target's name, role, colleagues, current projects, recent events, or organisational context. May mimic the writing style of a known contact.
Pretext Broad pretexts designed to apply to as many people as possible — fake delivery notifications, bank alerts, password reset requests, tax refund scams. Specific pretexts tailored to the target's role and responsibilities — a CFO receives a fake acquisition document, an IT administrator receives a fake vulnerability alert from a vendor they actually use, a developer receives a fake pull request notification for a repository they contribute to.
Sender Impersonation Impersonates well-known brands (Microsoft, DHL, Amazon, banks). No attempt to impersonate anyone the target knows personally. Impersonates a specific individual the target knows and trusts — their CEO, a colleague, a client, a supplier, a recruiter, a journalist. Uses lookalike domains, compromised accounts, or spoofed headers to make the impersonation convincing.
Success Rate Low per-email (typically 1–3% click rate). Relies on volume — if you send a million emails, 10,000–30,000 clicks is a viable return for a criminal operation. High per-email. A well-researched spear phish against a well-chosen target may have a success rate of 30–50% or higher. The attacker needs only one person to engage.
Technical Sophistication Often low. Commodity phishing kits, mass mailing infrastructure, minimal evasion. Many campaigns reuse identical templates across thousands of targets. Ranges from moderate to very high. May include adversary-in-the-middle proxies for real-time credential and session token theft, custom malware payloads, HTML smuggling, and multi-stage delivery chains designed to evade the specific email security products the target organisation uses.
Who Uses It Cybercriminal groups operating at scale — credential harvesting operations, romance scams, advance fee fraud, commodity malware distribution. Advanced Persistent Threat groups (state-sponsored espionage), targeted ransomware operators (Scattered Spider, LAPSUS$, Conti affiliates), Business Email Compromise syndicates, and red team operators conducting authorised engagements.

The defensive implication is critical: the technical controls that are effective against bulk phishing — spam filters, URL reputation databases, known-bad signature lists — are far less effective against spear phishing. A spear phish uses a newly registered domain with no reputation history, references real people and real events that pass plausibility checks, and may use a legitimate email service or compromised account that passes all authentication checks. The attack is designed from the ground up to bypass the specific defences the target organisation has deployed. This is why organisations that achieve near-zero click rates on generic phishing simulations still get breached through targeted spear phishing — they are measuring resilience against the wrong threat.


How attackers build the profile that makes the email convincing.

The quality of a spear phishing attack is directly proportional to the quality of the reconnaissance that precedes it. Before composing a single email, the attacker gathers intelligence about the target individual and their organisation — and most of that intelligence is freely available from public sources. The reconnaissance phase is not optional. It is what distinguishes spear phishing from bulk phishing, and it is what makes the resulting emails so difficult for both humans and technology to identify as malicious.

LinkedIn — The Attacker's Best Friend
LinkedIn provides the attacker with the target's full name, job title, employer, department, reporting structure, professional connections, career history, certifications, and often their interests and activities. For organisational targeting, LinkedIn reveals the entire staff directory — who works in finance, who manages IT, who sits on the board, who recently joined and might not yet recognise unusual requests, who recently left and might have accounts that haven't been deprovisioned. APT groups including APT35 and APT42 are documented creating fake LinkedIn personas to build relationships with targets before delivering payloads. For the attacker, LinkedIn is not a social network — it is an intelligence platform.
Corporate Websites, Press Releases, and Regulatory Filings
Company websites reveal organisational structure, key personnel, office locations, technology partnerships, recent announcements, and current projects. Press releases about mergers, partnerships, new hires, and contract awards provide timely pretexts — a spear phish referencing a real event that occurred last week is exponentially more convincing than a generic one. Companies House filings, annual reports, and investor communications reveal financial details, board composition, and strategic priorities. For regulated industries, public regulatory filings can reveal technology vendors, audit findings, and compliance obligations — all useful intelligence for crafting convincing pretexts.
Breach Data, Dark Web Markets, and Credential Dumps
Previous data breaches expose email addresses, passwords, personal information, and account associations. Even if passwords have been changed, breach data reveals the target's email format (firstname.lastname@company.com versus f.lastname@company.com), their personal email addresses, their password construction patterns, and their account registrations across services. For Business Email Compromise operations, knowing that a target uses a particular banking platform or accounting system makes the impersonation of that platform vastly more convincing. Credential dumps also enable credential stuffing — testing known passwords against the target's corporate accounts on the chance they reuse passwords across services.
Social Media, Conference Activity, and Public Speaking
Twitter/X posts, conference attendance, blog articles, GitHub contributions, forum posts, podcast appearances — all provide intelligence about the target's current interests, technical expertise, professional opinions, communication style, and personal life. An attacker impersonating a conference organiser to a target who recently spoke at that conference has a plausible pretext that generic phishing cannot achieve. A developer who tweets about debugging a particular framework can receive a targeted spear phish disguised as a Stack Overflow notification or GitHub issue related to that exact technology. Social media provides the context that makes pretexts feel authentic.
Technical Reconnaissance — Mapping the Defences
DNS records reveal mail servers and hosting providers. MX records identify whether the organisation uses Microsoft 365, Google Workspace, or an on-premises mail server — which tells the attacker which login page to clone. SPF, DKIM, and DMARC records reveal email authentication configuration — if the DMARC policy is p=none (monitoring only), the attacker can spoof the organisation's own domain directly. Certificate Transparency logs reveal subdomains and infrastructure. Job postings reveal technology stack, security tools in use, and gaps in the security team. Email headers from previous legitimate correspondence (available from breach data or earlier social engineering) reveal the exact email security gateway the organisation uses — allowing the attacker to test their payload against that specific product before sending it.
Timing Intelligence — When to Strike
Sophisticated attackers also gather timing intelligence. When does the CEO travel? When is the finance team busiest (month-end, quarter-end, year-end)? When has the organisation recently announced layoffs, creating anxiety and reduced vigilance? When is a major deal expected to close, creating urgency around financial transactions? Holiday periods and Friday afternoons are favoured delivery times — fewer people available to verify unusual requests, and slower <a href="https://www.cyber-defence.io/services/incident-response">incident response</a> if something is flagged. The spear phish arrives when the target is most likely to act quickly and least likely to verify.

The entire reconnaissance phase can be completed in hours using only publicly available information. No technical exploitation is required. No laws are broken during the intelligence gathering. The attacker simply reads what the target and their organisation have published — and uses it against them. This is why reducing your OSINT footprint is a defensive measure, and why social engineering assessments should always include a reconnaissance phase that demonstrates exactly what an attacker can learn about the organisation before sending a single email.


How the email gets through your defences.

A well-crafted spear phishing email is not merely convincing to the human recipient — it is engineered to bypass the specific email security controls deployed by the target organisation. The attacker considers and addresses each layer of technical defence, ensuring the email reaches the inbox where the human target can engage with it.

Defence Layer How Bulk Phishing Fails Here How Spear Phishing Evades It
Spam Filters Known-bad sender addresses, domains, and IP ranges are blocked. Mass-mailing patterns trigger volume-based heuristics. Known phishing templates match signature databases. Uses newly registered domains with no reputation history, or legitimate email services (Gmail, Outlook.com), or compromised accounts with established sending history. Single recipient — no volume pattern to detect. Unique content — no matching signature.
Email Authentication (SPF/DKIM/DMARC) Spoofed sender addresses fail SPF and DKIM checks. DMARC enforcement (p=reject) blocks unauthenticated messages claiming to be from the spoofed domain. Uses lookalike domains (hedgeh0g-security.com, hedgehog-secur1ty.com) that have their own valid SPF and DKIM configuration. Or exploits the target's weak DMARC policy — if p=none (monitoring only, no enforcement), the attacker can spoof the exact internal domain. Or compromises a legitimate account and sends from it — passing every authentication check.
URL Reputation and Sandboxing Known malicious URLs are blocked. Sandbox analysis follows links and detonates landing pages to detect credential harvesting or malware delivery. Uses newly created URLs with no reputation. Links may redirect through legitimate services (Google AMP, Cloudflare Workers, Azure Blob Storage, SharePoint). AitM credential harvesting proxies present the genuine Microsoft login page — sandbox analysis sees a legitimate website because it is one, merely proxied. Time-delayed activation ensures the URL is benign when scanned at delivery and malicious when clicked hours later.
Attachment Scanning Known malware signatures detected. Sandbox detonation observes malicious behaviour in attachments. Attachments may be clean PDFs containing links rather than embedded malware — nothing malicious to detect. Password-protected archives prevent sandbox analysis. HTML smuggling assembles payloads in the browser from encoded data within an HTML attachment, bypassing network-based scanning entirely. Modern malware uses sandbox evasion — detecting virtual environments through techniques like Euclidean distance cursor angle geometry analysis (as documented in the LummaC2 analysis in the Picus Red Report 2026) and suppressing malicious behaviour during analysis.
User Awareness Training Users trained to spot generic phishing — poor grammar, unfamiliar senders, suspicious urgency, 'Dear Customer' salutations — successfully identify and report bulk phishing campaigns. The email comes from or appears to come from someone the user knows. References real events. Uses correct grammar and appropriate tone. Creates plausible urgency tied to the target's actual responsibilities. The indicators that awareness training teaches users to identify are deliberately absent — because the attacker read the same awareness training materials.

The pattern is consistent: each layer of defence was designed to stop untargeted attacks at scale. A spear phish is neither untargeted nor at scale — it is a single, precision-crafted message designed to pass every check. This does not mean these defences are worthless — they remain essential for stopping the vast majority of phishing attempts. But it does mean that no combination of email security controls alone can guarantee that a well-crafted spear phish will not reach an inbox. Defence must extend beyond the email gateway.


What the attacker delivers when you engage with the email.

The spear phishing email is the delivery mechanism. What it delivers — the payload — determines the impact. Modern spear phishing campaigns use several payload types, often in combination, and the choice of payload reflects the attacker's objective, the target's environment, and the defences they need to evade.

Credential Harvesting via Adversary-in-the-Middle Proxy
The dominant spear phishing payload in 2025 and into 2026. The email contains a link to what appears to be a legitimate login page — Microsoft 365, Google Workspace, VPN portal, internal application. The page is the real login page, relayed through an adversary-in-the-middle proxy (Evilginx, Tycoon 2FA, Evilproxy, Modlishka). The victim enters their credentials, completes their MFA challenge — SMS code, TOTP authenticator, push notification — and the proxy captures both the credentials and the authenticated session token in real time. The attacker has full account access without needing to complete MFA again. The session token provides persistent access until it expires — typically 24 hours for Microsoft 365, potentially longer depending on configuration. This technique bypasses every form of MFA except FIDO2/WebAuthn hardware keys and passkeys, which are cryptographically bound to the legitimate domain and cannot be proxied. We examined this in depth in our analysis of MFA bypass techniques.
Malicious Document Payloads
Office documents with embedded macros, HTML Application (.hta) files, ISO disk images containing executables, password-protected ZIP archives, OneNote files with embedded scripts, Windows shortcut (.lnk) files that execute PowerShell commands — the delivery format evolves continuously as Microsoft and other vendors block each variant. The document typically requires user interaction to execute (enabling macros, extracting an archive, clicking an embedded object), which is precisely why the spear phishing pretext must be convincing — the user must be motivated to perform the action despite any security warnings. Once executed, the payload typically establishes a command-and-control channel, often over HTTPS to blend with legitimate traffic, and begins the post-exploitation lifecycle: credential harvesting, privilege escalation, lateral movement.
Multi-Stage Link Chains and Legitimate Service Abuse
Rather than linking directly to the malicious destination, the email links to a legitimate service — SharePoint, Google Drive, Dropbox, OneDrive, OneNote — that hosts a document containing a second link to the actual payload. This multi-hop delivery evades URL scanning because the initial link points to a trusted domain with an established reputation. The scanning engine sees a link to sharepoint.com and allows it. The malicious redirect or payload is one or more clicks deeper than the scanner checks. Some campaigns chain three or four legitimate services in sequence, each hosting a document that links to the next, creating a redirect chain that no single security product follows end to end.
HTML Smuggling
The email delivers an HTML attachment that appears benign to email security scanners — it contains no executable code, no links to malicious domains, no recognisable malware signatures. When the user opens it in their browser, JavaScript within the HTML file assembles and downloads a malicious payload (typically an ISO, ZIP, or executable) from data encoded within the HTML itself using Base64 or other encoding. The payload is never transmitted over the network as a recognisable malicious file — it is constructed locally in the browser from data that appears to the email scanner as harmless text. This technique has been documented in use by APT29 (Cozy Bear) and Nobelium, among others.
Callback Phishing — Hybrid Voice and Email
The email does not contain a link or attachment at all — it contains a phone number. The pretext typically involves a fake invoice, subscription renewal, security alert, or IT support notification, and asks the recipient to call to resolve the issue. When the victim calls, the attacker (or a call centre working on the attacker's behalf) walks them through installing remote access software — AnyDesk, TeamViewer, Quick Assist, ConnectWise — granting the attacker direct access to their workstation. This technique bypasses every email-based technical control because the email itself is entirely benign by every technical measure. There are no links, no attachments, no malicious indicators — only text and a phone number. Detection depends entirely on the human recipient recognising the social engineering.
Spear Phishing via Non-Email Channels (Smishing, Vishing, Messaging)
Increasingly, spear phishing payloads are delivered outside email entirely — via SMS (smishing), WhatsApp, LinkedIn messages, Slack DMs, Microsoft Teams messages, or direct phone calls (vishing). These channels bypass email security controls completely and often feel more personal and immediate than email. LAPSUS$ contacted the Uber contractor via WhatsApp during the MFA fatigue attack. Scattered Spider used SMS-based phishing directing employees to credential harvesting sites. APT42 initiated contact via social media platforms before moving to email. Organisations that focus their anti-phishing defences exclusively on email leave these channels entirely undefended.

When the target is the most powerful person in the room.

Two specialised variants of spear phishing deserve particular attention because of their outsized financial and strategic impact.

Whaling targets senior executives — CEOs, CFOs, board members, managing directors, general counsel. These individuals have the authority to approve large financial transactions, access the most sensitive corporate information, and override standard procedures. They are also frequently the least likely to follow security policies — using personal devices, requesting exceptions to MFA requirements, and operating with a sense of urgency that discourages verification. A successful whaling attack against a CFO can result in direct financial losses measured in millions from a single fraudulent transaction. The term reflects the scale of the prize: the attacker is not fishing for any catch — they are targeting the biggest fish in the organisation.

Business Email Compromise (BEC) takes whaling further still. Rather than impersonating an executive via a lookalike domain, the attacker compromises the executive's actual email account — often through a prior spear phishing credential harvest using an AitM proxy. Once inside the real mailbox, the attacker monitors email conversations silently, identifies pending transactions (payments to suppliers, deal closings, invoice settlements), studies the communication patterns and writing style, and at precisely the right moment sends an email from the genuine account requesting that payment details be changed or an urgent transfer be processed. Because the email comes from the real account, passes every authentication check, matches the executive's writing style, and references a real transaction the finance team is already expecting, even cautious, well-trained finance teams comply. The FBI's Internet Crime Complaint Centre reports that BEC has caused greater cumulative financial losses than any other category of cybercrime — global losses exceeding $50 billion since tracking began. This is not a technology failure. Every technical control works exactly as designed. The email is authentic. The account is genuine. The authentication is valid. The failure is human — a process that permits high-value financial transactions based on email authority alone.


How nation-state groups weaponise spear phishing.

Every major APT group documented in the threat intelligence literature uses spear phishing as a primary or significant initial access vector. The table below draws from groups we have profiled in our threat intelligence series, demonstrating the consistency of the technique across different nations, motivations, and operational objectives.

Threat Actor Spear Phishing Methodology Notable Campaigns
APT1 / Comment Crew
(PRC/PLA Unit 61398)
Sent emails containing malicious ZIP attachments with disguised executables using double extensions (report.pdf.exe). Subject lines and body text tailored to recipients' professional interests. Created webmail accounts using real people's names. When victims replied asking about unexpected attachments, APT1 operators replied in conversational English encouraging them to open the files — active, real-time social engineering. 141 organisations across 20 industries over a decade. Averaged 6.5 TB of compressed data stolen per compromise. Used custom WEBC2 malware family that received commands via HTML comments on legitimate-looking web pages — hiding C2 traffic in plain sight.
APT35 / Charming Kitten
(Iran/IRGC)
Conducted extended social engineering campaigns — building rapport with targets over weeks or months before delivering any payload. Impersonated journalists conducting interviews, academic researchers seeking collaboration, and think-tank organisers extending conference invitations. Created convincing fake personas with detailed LinkedIn profiles, personal websites, and publication histories. The patience was the weapon — by the time the payload was delivered, the target trusted the persona. Journalists covering Iranian affairs, human rights activists, academic researchers, policy experts, government officials in the US, UK, and Middle East. Focus on intelligence collection for the IRGC — monitoring dissidents and understanding Western policy positions.
APT42
(Iran/IRGC)
Similar to APT35 but with even more elaborate persona development. Created fully backstopped fake identities with social media presence, academic publications, and professional histories. Engaged targets in prolonged correspondence — some lasting months — building genuine professional relationships before introducing a malicious link or document. Demonstrated exceptional patience and social engineering skill, willing to invest significant time in a single target. Political campaigns (including US election-related targeting), government officials, NGOs, media organisations, academic institutions. Focused on surveillance, intelligence collection, and credential harvesting to enable monitoring of persons of interest to the Iranian state.
APT29 / Cozy Bear
(Russia/SVR)
Compromised legitimate email accounts and used them to send spear phishing emails to new targets — ensuring the emails passed every authentication check and reputation filter. Used HTML smuggling to deliver payloads that bypassed email security gateways. Deployed multi-stage infection chains with significant obfuscation. Known for operational patience and exceptional OPSEC. Government agencies, diplomatic missions, think tanks, technology companies globally. TeamViewer's corporate network compromised via employee credential theft in June 2024. SolarWinds supply chain compromise began with targeted social engineering.
APT34 / OilRig
(Iran/MOIS)
Combined spear phishing with DNS tunnelling for covert data exfiltration. Delivered weaponised documents that established backdoors communicating via DNS queries — a channel that most organisations monitor poorly if at all. Used legitimate web services for C2 communication, hiding malicious traffic within normal web browsing patterns. Government, energy, telecoms, and financial services organisations across the Middle East. Focused on intelligence gathering in support of Iranian national security objectives.
Scattered Spider
(Criminal)
Combined spear phishing with helpdesk social engineering, SIM swapping, MFA fatigue attacks, and voice phishing (vishing). Impersonated IT staff via email and SMS to direct employees to credential harvesting sites. Called helpdesks impersonating employees to request password resets and MFA token resets. Contacted targets via WhatsApp with push notification bombardment. Demonstrated that technical sophistication is secondary to social engineering skill. MGM Resorts ($100M+ impact), Caesars Entertainment (paid ransom), multiple technology and telecoms companies. Financially motivated — ransomware deployment and data theft for extortion.

The common thread across all these actors — spanning three different nations and motivations ranging from state espionage to financial extortion — is that spear phishing remains the preferred initial access vector. Not because more technically sophisticated methods are unavailable, but because spear phishing works more reliably, more repeatedly, and at lower cost than exploiting software vulnerabilities. A zero-day exploit costs hundreds of thousands of pounds to develop and is burned once used. A spear phishing email costs hours of research and can be adapted and reused indefinitely.


Spear phishing in the ATT&CK framework.

MITRE ATT&CK classifies spear phishing under the Initial Access tactic (TA0001) with three distinct sub-techniques, reflecting the different delivery mechanisms attackers use. Understanding these classifications helps organisations map their defences to specific attack vectors and identify gaps in coverage.

Technique ID Name Description Primary Defences
T1566.001 Spearphishing Attachment Email contains a malicious file — Office documents with macros, executables in archives, ISO disk images, HTML files with embedded payloads, LNK shortcut files. Requires user interaction to execute. Most commonly used when the attacker wants to establish a persistent foothold on the target's endpoint rather than just harvesting credentials. Attachment sandboxing with anti-evasion capabilities. Block dangerous file types at the email gateway (.iso, .img, .hta, .lnk, password-protected archives). Disable Office macros by default via Group Policy for users who do not require them. Application control (AppLocker, WDAC) to prevent execution of untrusted files. Endpoint Detection and Response for post-execution detection.
T1566.002 Spearphishing Link Email contains a link to an attacker-controlled resource — credential harvesting page (often via AitM proxy), drive-by download site, or legitimate cloud service hosting the next stage of the payload. The most common spear phishing sub-technique in 2025/2026 due to the effectiveness of AitM credential harvesting against all non-FIDO2 MFA methods. URL rewriting with time-of-click analysis (re-evaluates URLs when clicked, not only at delivery). Phishing-resistant MFA (FIDO2/WebAuthn) to mitigate credential theft even if the user clicks. Browser isolation for high-risk users. Conditional access policies that restrict authentication to compliant devices and managed networks.
T1566.003 Spearphishing via Service Spear phishing delivered via a platform other than corporate email — LinkedIn messages, Slack DMs, Microsoft Teams messages, SMS (smishing), WhatsApp, social media direct messages, voice calls (vishing). Bypasses email security controls entirely because the delivery channel is different. Security awareness that extends beyond email to cover all communication channels. Endpoint detection for malicious downloads regardless of source. Network monitoring for connections to known phishing infrastructure. MFA and conditional access that protect accounts regardless of how credentials are harvested. Helpdesk procedures that verify caller identity through secure methods.

From email to full compromise — a realistic walkthrough.

Understanding spear phishing in isolation is insufficient. The email is step one in an attack chain that, left undetected, leads to full organisational compromise. This walkthrough demonstrates the complete lifecycle — from reconnaissance through objective completion — using techniques documented from real APT operations and our own engagement experience.

Spear Phishing Attack Chain — Complete Lifecycle
# Phase 1: Reconnaissance (1-2 days)
linkedin --target='Acme Financial Services' # Map org structure, identify targets
# Result: Sarah Chen, Head of Finance — reports directly to CFO
# Result: Recent post about 'exciting Q3 acquisition pipeline'
harvester --domain=acme-fs.co.uk # Email format: s.chen@acme-fs.co.uk
dig TXT acme-fs.co.uk # DMARC p=none — no enforcement
dig MX acme-fs.co.uk # Microsoft 365 — clone M365 login

# Phase 2: Infrastructure (hours)
register acme-fs-secure.com # Lookalike domain for AitM proxy
configure --spf --dkim --dmarc=reject # Valid email auth on our domain
deploy --evilginx --target=login.microsoftonline.com # AitM proxy ready

# Phase 3: Delivery
send --from='m.davies@acme-fs.co.uk' # Spoof CFO (DMARC p=none allows this)
# To: s.chen@acme-fs.co.uk
# Subject: 'Project Falcon — Confidential — NDA Required'
# Body: References real acquisition pipeline from LinkedIn post
# Link: acme-fs-secure.com/falcon/nda-review # AitM proxy to M365 login
# Sent: Friday 16:47 — end of week, reduced vigilance

# Phase 4: Credential and Session Capture
# Sarah clicks link, sees genuine M365 login page (proxied)
# Sarah enters credentials, completes MFA push notification
captured --username=s.chen@acme-fs.co.uk # Credentials captured
captured --session-token=eyJ0eXAiOiJKV1Q... # Session token captured
# MFA bypassed — we have an authenticated session

# Phase 5: Post-Compromise (minutes to hours)
access --mailbox=s.chen@acme-fs.co.uk # Read email, map internal contacts
search --terms='bank details' 'payment' 'wire transfer' # Find pending transactions
create-rule --forward-to=attacker-monitored@proton.me # Silent email forwarding
access --sharepoint --onedrive # Session token grants access to all M365

# Phase 6: Objective — BEC Wire Fraud
# Wait for real transaction, intercept, modify bank details
# Or: use session token to access VPN, pivot to internal network
# Or: exfiltrate SharePoint data — client files, contracts, IP

# Detection opportunities missed:
# 1. DMARC p=none — spoofed email delivered without quarantine
# 2. New domain link — no URL reputation, allowed through
# 3. AitM proxy — showed genuine M365 login, sandbox saw nothing
# 4. No impossible travel alert — attacker used residential proxy
# 5. No mail forwarding rule alert — not monitored
# 6. No conditional access — session token accepted from any device

Every step in that chain used documented, repeatable techniques. No zero-day exploits. No custom malware. No exceptional technical skill beyond competent OSINT and infrastructure setup. The DMARC misconfiguration enabled the domain spoof. The AitM proxy defeated MFA. The LinkedIn post provided the pretext. The Friday afternoon timing reduced scrutiny. Six distinct detection opportunities existed and were missed — not because the technology was absent, but because it was not configured, not monitored, or not designed to detect this specific attack pattern.


How we simulate spear phishing during engagements.

When authorised to conduct social engineering assessments, our approach replicates the methodology of real threat actors — because testing against unrealistic simulations produces unrealistic results. An assessment using a generic 'Your password will expire' template tells you nothing about your organisation's resilience against the attacks that actually breach organisations.

Reconnaissance Phase
We conduct full OSINT reconnaissance against the target organisation and selected individuals using the same sources real attackers use — LinkedIn, corporate websites, social media, public records, breach data, DNS records, email header analysis, and regulatory filings. This produces the targeting intelligence that makes our spear phishing pretexts convincing and realistic. We do not skip this step and we do not use generic templates. Every phishing email we send is crafted for the specific target, referencing real people, real events, and real organisational context.
Pretext Development
We develop pretexts that are realistic, timely, and tailored to the target's role and current responsibilities. A finance team member receives a fake invoice referencing a real supplier relationship. An IT administrator receives a fake security advisory referencing technology the organisation actually uses. An executive receives a fake board communication referencing a real strategic initiative. A developer receives a fake pull request notification for a repository they contribute to. The goal is to test human judgement under conditions that replicate real attacks, not to trick people with obvious bait.
Infrastructure and Payload
We register lookalike domains, configure valid SPF/DKIM/DMARC, deploy credential harvesting pages or AitM proxies, and set up comprehensive tracking to measure every stage of engagement. Our infrastructure is engineered to evade the client's email security controls — because that is what a real attacker would do. If our emails are blocked before delivery, we report that as a positive finding, document how the controls performed, and adjust our approach to test the next layer of defence.
Metrics That Matter
We measure and report delivery rate (did the email reach the inbox?), open rate, click-through rate, credential submission rate, payload execution rate, and — most critically — reporting rate (did anyone report the email as suspicious to the security team?). The reporting rate is the single most important metric because it measures the one user behaviour that actively contributes to organisational defence. An organisation where 15% of users click but 40% report is in a significantly stronger defensive position than one where 5% click but nobody reports — because reports enable investigation, containment, and response before the attacker achieves their objective.

Layered defence against an attack that targets every layer.

No single control can prevent spear phishing. The attack is specifically designed to bypass individual defences. Effective protection requires layered defence where each control reduces the probability of success at its stage — and failure at one layer does not mean failure overall. The objective is not to make spear phishing impossible (it is not), but to ensure that the attack chain is disrupted before the attacker achieves their objective.

Email Authentication at Enforcement — SPF, DKIM, DMARC p=reject
Implement SPF, DKIM, and DMARC with a policy of p=reject (not p=none, which only monitors and takes no action). This prevents attackers from spoofing your exact domain in the From address — as the walkthrough above demonstrated, a p=none policy allowed the attacker to send email as the CFO from outside the organisation. DMARC at enforcement eliminates an entire category of impersonation. It does not prevent lookalike domains — but it removes the most convincing form of spoofing. Publish DMARC reports and monitor them for spoofing attempts against your domain. The control is free to implement and its absence is one of the first things an attacker checks during reconnaissance.
Email Security Gateway with Advanced Analysis
Deploy email security that goes beyond signature-based detection: URL rewriting with time-of-click analysis that re-evaluates URLs when clicked (not just when delivered, since attackers activate malicious pages after delivery), attachment sandboxing with anti-evasion capabilities, impersonation detection that flags emails where the display name matches an internal executive but the sender address is external, and integration with threat intelligence feeds for known phishing infrastructure. Configure the gateway to quarantine rather than deliver suspicious messages, and ensure the SOC has visibility into quarantined items.
Phishing-Resistant MFA — FIDO2/WebAuthn
If the spear phish succeeds and the user clicks through to a credential harvesting page, FIDO2/WebAuthn authentication prevents the attacker from using the harvested credentials. Hardware security keys (YubiKey, Titan) and platform passkeys cryptographically bind authentication to the legitimate domain — an AitM proxy on a different domain cannot complete the authentication challenge because the cryptographic response will not match. This is the single most effective technical control against credential-harvesting spear phishing and the only form of MFA that is structurally immune to AitM attacks. CISA specifically recommends FIDO2 deployment for protection against groups like Scattered Spider.
Targeted Security Awareness — Beyond Generic Training
Generic awareness training that teaches users to spot poor grammar and suspicious sender addresses is insufficient against spear phishing, which deliberately avoids those indicators. Effective anti-spear-phishing training must teach users to: verify unexpected requests through a separate communication channel (call the person who supposedly sent the email, using a known number — not one provided in the email), be suspicious of urgency that discourages verification regardless of who the sender appears to be, check the actual sender address (not just the display name) and understand that a matching display name means nothing, and critically — report anything suspicious regardless of whether they clicked. Train against realistic, targeted simulations that mimic real threat actor methodology, not generic templates that test recognition of obvious phishing.
Reporting Culture — The Most Valuable Human Defence
A user who reports a suspicious spear phishing email that bypassed all technical controls gives the SOC the opportunity to investigate, identify other recipients, revoke compromised sessions, and contain the incident before the attacker achieves their objective. This single human action — reporting — is more valuable than all other user behaviours combined. Organisations that punish or embarrass users for clicking suppress exactly the behaviour they need most. Build a reporting culture: make reporting easy (one-click button in the email client), acknowledge every report, share anonymised outcomes ('the email you reported was confirmed malicious and has been removed from all inboxes'), and celebrate reporters rather than shaming clickers.
Financial Transaction Verification — Out-of-Band Confirmation
Implement mandatory out-of-band verification for all financial transactions above a defined threshold, all changes to payment details or bank accounts, and all new supplier registrations. Out-of-band means a phone call to a known number (from the existing supplier record, not from the email requesting the change) to confirm the request is genuine. This single procedural control has prevented more BEC losses than any technology. It costs nothing to implement, requires no technology, and is effective against even the most sophisticated spear phishing and BEC attacks — because even if the attacker controls the email account, they do not control the telephone line at the supplier's verified number.
Post-Delivery Detection, Monitoring, and Response
Accept that some spear phishing emails will reach inboxes despite all preventive controls — this is a certainty, not a possibility. Invest in detection after delivery: email threat hunting for indicators of compromise across all mailboxes, automated retrospective analysis that re-scans delivered emails as new threat intelligence becomes available, and rapid incident response capability to contain compromised accounts. Monitor for specific post-compromise indicators: impossible travel (login from London then Moscow within minutes), new inbox rules (auto-forwarding, auto-deletion of specific senders), OAuth application consent grants (a primary persistence mechanism), anomalous SharePoint or OneDrive access patterns, and mailbox delegation changes.
Reduce Your OSINT Footprint
The reconnaissance phase relies on publicly available information. While you cannot eliminate your public presence entirely, you can reduce unnecessary exposure that makes spear phishing pretexts more convincing: review what information LinkedIn profiles reveal about internal structure, reporting lines, and technology stack; limit the detail in public job postings about security tools, infrastructure, and internal systems; control what appears in press releases and investor communications about strategic initiatives and deals; ensure DMARC, SPF, and DNS records do not leak unnecessary technical information about internal infrastructure; and train staff to be conscious of what they share publicly about their work and their employer.

Why this is not a technology problem with a technology solution.

Spear phishing is fundamentally a human problem. The technology is the delivery mechanism, but the vulnerability being exploited is trust — the willingness of a human being to act on a request that appears to come from a trusted source. No email security product, however sophisticated, can make the determination that a particular request from a particular sender about a particular transaction is fraudulent when the email is technically legitimate, properly authenticated, and contextually plausible.

This does not mean technology is irrelevant — every layer of technical defence reduces the probability that a spear phish reaches a human inbox. But it does mean that any defensive strategy that relies exclusively on technology will fail. The organisations with the strongest resilience against spear phishing are those that combine technical controls with a culture of verification: where questioning unexpected requests is encouraged rather than seen as obstructive, where reporting suspicious communications is rewarded rather than punished, where financial processes include human verification steps that cannot be bypassed by email authority alone, and where senior executives are subject to the same security policies as everyone else — because they are the most valuable targets, not the least likely to be attacked.

The helpdesk deserves particular attention. Across our engagements, the helpdesk is consistently the weakest human link in the defensive chain — trained to be helpful, authorised to reset passwords and MFA tokens, and rarely trained to resist the level of social engineering that a targeted attacker will employ. Scattered Spider's breach of MGM Resorts began with a phone call to the helpdesk. Strengthening helpdesk verification procedures — requiring callback verification to a known number, implementing challenge questions that cannot be answered from OSINT, and restricting the scope of changes that can be made via phone — is one of the highest-impact defensive investments an organisation can make against both spear phishing and its voice-based equivalent.


The bottom line.

Spear phishing is the most successful initial access technique in the threat landscape — and it has held that position for over two decades. It is used by every major APT group, every sophisticated criminal operation, and every competent red team. It succeeds because it exploits human trust rather than software vulnerabilities, because it is crafted to bypass the specific technical controls the target organisation has deployed, and because the reconnaissance required to make it convincing is freely available from public sources that the target organisation and its employees publish themselves.

The defence is not a single product, a single training programme, or a single policy. It is a layered strategy that combines email authentication at enforcement to prevent domain spoofing, advanced email security to detect suspicious content and links, phishing-resistant MFA to mitigate credential theft when users click, targeted awareness training to strengthen human judgement against realistic attacks, a reporting culture that rewards vigilance and enables rapid response, procedural controls for high-risk transactions that cannot be bypassed by email authority alone, post-delivery detection and response for when — not if — preventive controls fail, and ongoing reduction of the public information that enables attackers to craft convincing pretexts in the first place.

The most important defensive insight is this: a spear phishing email that reaches an inbox is not a failure of security. It is an expected event in any realistic threat model. The failure is when the email reaches the inbox, the user engages with it, the credentials or session tokens are harvested, the attacker establishes persistence, moves laterally, and achieves their objective — and nobody along that entire chain, from the user to the email platform to the SOC, identifies or responds to the compromise before it is too late. Every layer of defence that delays, detects, or disrupts that chain reduces the probability of catastrophic outcome. No single layer eliminates the risk. Together, they make the attacker's job materially harder — and in offensive security, harder means slower, and slower means more likely to be detected.


How would your people perform against a realistic spear phish?

Our social engineering assessments replicate real threat actor methodology — researched, targeted, and designed to test your defences under realistic conditions. We measure not just who clicks, but who reports — because reporting is the behaviour that matters most.