{"id":83687,"date":"2025-01-28T20:06:38","date_gmt":"2025-01-28T20:06:38","guid":{"rendered":"https:\/\/mailrelay.com\/glosario\/spear-phishing\/"},"modified":"2025-02-07T19:56:35","modified_gmt":"2025-02-07T19:56:35","slug":"spear-phishing","status":"publish","type":"glossary","link":"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/","title":{"rendered":"Spear phishing"},"content":{"rendered":"\n<p><strong>Spear phishing is a highly personalized phishing attack. <\/strong><\/p>\n\n<p>The term &#8220;spear&#8221; refers to the fact that the <strong>attack is very specifically<\/strong> targeted, rather than casting a wide net like traditional phishing. <\/p>\n\n<p><strong>This selective method creates emails that look legitimate<\/strong>, as the cyber attackers spend time researching the victim on social media, websites or even through previous data leaks. <\/p>\n\n<p>For example, they may know the name of your boss, your job title, information about your company and much more.<\/p>\n\n<p><strong>Due to this detailed information, the message looks credible at first glance. <\/strong><\/p>\n\n<p>The malicious email or message may appear to come from a co-worker, your bank or a service you trust. <\/p>\n\n<p>It often includes links or attachments infected with malware, or asks you to disclose sensitive data (such as passwords or financial information). <\/p>\n\n<p><strong>Due to the trust that recipients usually place in the <a href=\"https:\/\/mailrelay.com\/es\/glosario\/remitente\/\">sender<\/a><\/strong> when it appears to come from a legitimate source, the success rate of this cyber scam is quite high.<\/p>\n\n<h2 class=\"wp-block-heading\">Why is it different from normal phishing?<\/h2>\n\n<p>The most obvious differences between &#8220;normal&#8221; <a href=\"https:\/\/mailrelay.com\/en\/glossary\/phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a> and spear phishing would be:<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Personalization level<\/h3>\n\n<p>While traditional phishing resorts to <strong>mass mailings with generic messages<\/strong> (&#8220;Your account has been blocked, click here&#8221;), <strong>targeted phishing is elaborated with specific data<\/strong> about you or your company (&#8220;Hi, Maria. We have detected suspicious movements in your account. Click this link to review the information now.&#8221;).<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Success rate <\/h3>\n\n<p>Mass phishing relies on large numbers, although its success rate is low, it is sent to many recipients. <\/p>\n\n<p>On the other hand, spear phishing attacks few people, but with such a careful message that the conversion rate and the number of frauds is higher.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Investigate before attacking <\/h3>\n\n<p>Spear phishing is based on collecting specific data. <\/p>\n\n<p>Cybercriminals may use social media or professional platforms to create the victim&#8217;s profile and write a deceptive email that looks 100% real.<\/p>\n\n<h2 class=\"wp-block-heading\">The process behind a Spear Phishing attack<\/h2>\n\n<p>Although each attack may vary in its tactics, the typical targeted phishing process involves the following stages:<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Collecting data <\/h3>\n\n<p>The scammer will investigate the target. <\/p>\n\n<p>They will check social media profiles such as LinkedIn, Facebook or Instagram for details to craft a tailored message. <\/p>\n\n<p>In addition, they can search for company data (organization chart, project information, suppliers, partners, etc.) to create an even more credible message.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Message design <\/h3>\n\n<p>With the information gathered, the attacker composes an <a href=\"https:\/\/mailrelay.com\/en\/glossary\/email-address\/\" target=\"_blank\" rel=\"noreferrer noopener\">email<\/a> that mimics the tone, identity and style of a real person or entity. They will use subject lines that generate urgency or appeal to curiosity. <\/p>\n\n<p>For example: <em>&#8220;Report of this month&#8217;s outstanding payments&#8221;<\/em> or <em>&#8220;Important information about your next project&#8221;.<\/em><\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Manipulation after the email is sent <\/h3>\n\n<p>Once the victim receives the email, if they consider it authentic, they may perform the required action (click on a link, download a file or reply with confidential information). <\/p>\n\n<p><strong>The attacker thus achieves his goal<\/strong>: to install <a href=\"https:\/\/mailrelay.com\/es\/glosario\/malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware<\/a>, hijack passwords or even trigger fraudulent bank transfers.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Overcoming filters <\/h3>\n\n<p>Many hackers use sophisticated techniques to circumvent antispam and antivirus filters. <\/p>\n\n<p>They may send emails from domains similar to the original, use <a href=\"https:\/\/mailrelay.com\/en\/glossary\/spoofing\/\" target=\"_blank\" rel=\"noreferrer noopener\">spoofing <\/a> techniques ( spoofing of the sender&#8217;s address) or submit documents with disguised malicious code.<\/p>\n\n<h2 class=\"wp-block-heading\">Common methods of targeted attacks<\/h2>\n\n<p>Despite being a highly targeted type of phishing attack, spear phishing shares certain tools and methods with other variants of online fraud:<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Social engineering <\/h3>\n\n<p>The basis of this type of scam lies in <strong>persuading the victim to provide data<\/strong> or act without asking any questions. <\/p>\n\n<p>The use of personal data, the tone of urgency or the promise of an immediate benefit are very frequent forms of manipulation.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Fake URLs <\/h3>\n\n<p>Criminals may use links that look legitimate at first glance, but lead to fraudulent sites. <\/p>\n\n<p><strong>These domains often use small typographical variations<\/strong> (e.g. replacing one letter with a very similar one) <strong>or redirect to pages that are almost identical to the real portal.<\/strong><\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Infected attached files <\/h3>\n\n<p>Text documents, spreadsheets and even PDFs <strong>with malware included<\/strong>. <\/p>\n\n<p>Once downloaded and opened, they infect the system without the user noticing anything immediately.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Taking advantage of the reputation of third parties <\/h3>\n\n<p>They could impersonate a courier service, payment platform or trusted contact. <\/p>\n\n<p>In this way, the good reputation of the alleged source is used to gain credibility.<\/p>\n\n<h2 class=\"wp-block-heading\">Who are the most frequent victims?<\/h2>\n\n<p>Personalized phishing can target anyone, but there are certain groups and profiles that cybercriminals tend to target more frequently:<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Directors and company employees <\/h3>\n\n<p>If a hacker manages to fool a manager or someone with access to sensitive information (e.g., the finance department), the potential damage can be enormous. <\/p>\n\n<p>From embezzlement and illegitimate transfers to theft of corporate secrets.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Key employees from relevant departments <\/h3>\n\n<p>Not only managers are targeted, but also HR, accounting or IT professionals who handle critical data and have access to essential systems.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Bank users<\/h3>\n\n<p><strong>Customers of banks or online payment platforms<\/strong> receive very realistic emails asking them to verify their account or change their password. <\/p>\n\n<p>These attacks take advantage of the fear of losing access or becoming a victim of theft.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Government agencies or public institutions <\/h3>\n\n<p>Personal data, strategic plans or confidential information can be the target of espionage or blackmail.<\/p>\n\n<h2 class=\"wp-block-heading\">Consequences of a Spear Phishing Attack<\/h2>\n\n<p>Falling victim to a targeted phishing attack can have devastating results at both the individual and business level. <\/p>\n\n<p><strong>On a personal level, you could lose access to your bank accounts, suffer identity theft<\/strong> or have your private data exposed on the Dark Web. <\/p>\n\n<p>At the corporate level, financial losses can be substantial and the company&#8217;s reputation irreparably damaged. <\/p>\n\n<h2 class=\"wp-block-heading\">Recommendations to protect yourself from Spear Phishing<\/h2>\n\n<h3 class=\"wp-block-heading\">\u00b7 Educate and raise awareness <\/h3>\n\n<p>In-house staff training and individual awareness are the first line of defense. <\/p>\n\n<p>Recognizing the typical signs of targeted cyber scams can make all the difference. <\/p>\n\n<p><strong>Promote cybersecurity training programs <\/strong>that to explain the risks, show real examples and encourage caution before clicking on any suspicious links.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Check sender domain authenticity <\/h3>\n\n<p><strong>If you receive an email that asks for confidential information or makes you feel rushed, stop and check the email address carefully. <\/strong><\/p>\n\n<p>Sometimes a small change in the domain name or an additional hyphen reveals fraud. <\/p>\n\n<p>In addition, you can contact the person or company through another channel (phone or official chat) to confirm.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Check links before clicking <\/h3>\n\n<p><strong>Hover over the link without clicking<\/strong> to see the actual address. <\/p>\n\n<p>If it doesn&#8217;t match the URL of the official site or looks strange, do not open it. <\/p>\n\n<p><strong>This simple action can prevent many problems.<\/strong><\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Use security tools <\/h3>\n\n<p>Antivirus, firewalls and advanced mail filters can detect and block many targeted phishing attempts. <\/p>\n\n<p>Be sure to keep these systems up to date.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Two-factor authentication<\/h3>\n\n<p><strong>Enabling two-factor verification<\/strong> on your accounts means that even if an attacker steals your password, they need an additional code (usually sent to your smartphone) to get in. <\/p>\n\n<p>This extra layer of security can thwart numerous attacks.<\/p>\n\n<h3 class=\"wp-block-heading\">&#8211; Robust access policies and passwords: <\/h3>\n\n<p>Avoid using the same password in multiple services and encourage the use of long combinations, with special characters and numbers. <\/p>\n\n<p>It is also important to establish password rotation and restricted access policies to reduce the risk of intrusions.<\/p>\n\n<h2 class=\"wp-block-heading\">Relationship between Spear Phishing and Email Marketing<\/h2>\n\n<p>Although <a href=\"https:\/\/mailrelay.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">email marketing<\/a> and targeted phishing are at opposite ends of the spectrum (one is legitimate and aimed at strengthening customer communication, while the other is intended to deceive), it is undeniable that both use email as their primary channel. <\/p>\n\n<p>Therefore, <strong>it is essential that companies working with mass mailings ensure good email marketing practices<\/strong> and keep up to date with data protection regulations.<\/p>\n\n<p><a href=\"https:\/\/mailrelay.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mailrelay<\/a>, for example, promotes responsible email marketing campaigns, with a focus on data protection and correct audience segmentation to ensure that each message is relevant and doesn&#8217;t become spam. <\/p>\n\n<p>This emphasis on ethical communication ensures that recipients trust the emails they receive and don&#8217;t mistake them for scams. <\/p>\n\n<p>In addition, <strong>implementing authentication such as <a href=\"https:\/\/mailrelay.com\/en\/glossary\/dkim-domainkeys-identified-mail\/\" target=\"_blank\" rel=\"noreferrer noopener\">DKIM<\/a>, <a href=\"https:\/\/mailrelay.com\/en\/glossary\/spf-sender-policy-framework\/\" target=\"_blank\" rel=\"noreferrer noopener\">SPF<\/a> and <a href=\"https:\/\/mailrelay.com\/en\/glossary\/dmarc\/\" target=\"_blank\" rel=\"noreferrer noopener\">DMARC<\/a> in your mass mailings can serve as a backup<\/strong> to demonstrate the legitimacy of your mailing campaigns to spam filters and to your own subscribers.<\/p>\n\n<p><strong>On the other hand, the correct use of email marketing builds trust. <\/strong><\/p>\n\n<p><strong>That bond of trustworthiness is so important<\/strong> that, if broken by careless practices, it leaves a door open for cybercriminals to take advantage of the confusion and successfully impersonate your brand for malicious purposes.<\/p>\n\n<h2 class=\"wp-block-heading\">Examples of related frauds<\/h2>\n\n<p>Spear phishing is not the only attack that uses the inbox for malicious purposes. <\/p>\n\n<p>Other fraud attempts are also based on the same premise:<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Whaling <\/h3>\n\n<p>It specifically targets senior executives, with elaborate emails that seek to steal large sums of money or strategic data from the organization.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Vishing<\/h3>\n\n<p>Instead of email, it uses voice calls and phone manipulation to get victims to reveal sensitive information. <\/p>\n\n<p>However, it can be combined with spear phishing to obtain additional data.<\/p>\n\n<h3 class=\"wp-block-heading\">\u00b7 Smishing <\/h3>\n\n<p>These are malicious text messages<a href=\"https:\/\/mailrelay.com\/en\/sms\/\" target=\"_blank\" rel=\"noreferrer noopener\">(SMS<\/a>), with links to fake pages or inciting the victim to download dangerous files on their smartphone.<\/p>\n\n<p><strong>Despite the different ways used, the principle remains the same:<\/strong> deceive the victim by gaining their trust and using personal data to make everything look legitimate.<\/p>\n\n<h2 class=\"wp-block-heading\">How to Detect a Suspicious Spear Phishing E-mail<\/h2>\n\n<p>Finally, here is a short checklist of signs that should set off alarm bells:<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Excessive urgency: <\/strong>messages insisting that you have to act &#8220;immediately&#8221; or you will lose something valuable.<\/li>\n\n\n\n<li><strong>Unusual requests: <\/strong>requests to send funds, open unknown links or share passwords.<\/li>\n\n\n\n<li><strong>Spelling or stylistic errors: <\/strong>although increasingly sophisticated, some malicious emails still show grammar or stylistic errors that don&#8217;t match the supposed official source.<\/li>\n\n\n\n<li><strong>Strange e-mail addresses:<\/strong> the domain may look real, but watch for changed letters, unknown subdomains or unusual forms of the company name.<\/li>\n\n\n\n<li><strong>Attachments without context:<\/strong> if you were not expecting to receive an attachment, be wary. Check with the sender before downloading or opening any document.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n<p>Spear phishing, also known as targeted phishing, is a growing threat in the cybersecurity landscape. <\/p>\n\n<p>Its ability to impersonate seemingly trustworthy contacts or entities, coupled with the criminal&#8217;s thorough investigation of the victim, allows scammers to plan attacks that will have a significant impact. <\/p>\n\n<p>This type of cyber scam combines tactics, persuasion and technology to make even the most experienced users let their guard down.<\/p>\n","protected":false},"template":"","class_list":["post-83687","glossary","type-glossary","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spear phishing - Mailrelay<\/title>\n<meta name=\"description\" content=\"Spear phishing is a highly personalized phishing attack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spear phishing - Mailrelay\" \/>\n<meta property=\"og:description\" content=\"Spear phishing is a highly personalized phishing attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailrelay\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Mailrelay\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-07T19:56:35+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@mailrelay\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/\",\"url\":\"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/\",\"name\":\"Spear phishing - Mailrelay\",\"isPartOf\":{\"@id\":\"https:\/\/mailrelay.com\/en\/#website\"},\"datePublished\":\"2025-01-28T20:06:38+00:00\",\"dateModified\":\"2025-02-07T19:56:35+00:00\",\"description\":\"Spear phishing is a highly personalized phishing attack\",\"breadcrumb\":{\"@id\":\"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailrelay.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spear phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailrelay.com\/en\/#website\",\"url\":\"https:\/\/mailrelay.com\/en\/\",\"name\":\"Mailrelay\",\"description\":\"Mailrelay.com - Email Marketing Software\",\"publisher\":{\"@id\":\"https:\/\/mailrelay.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailrelay.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailrelay.com\/en\/#organization\",\"name\":\"Mailrelay\",\"url\":\"https:\/\/mailrelay.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailrelay.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mailrelay.com\/wp-content\/uploads\/2019\/05\/mailrelay-logo.jpg\",\"contentUrl\":\"https:\/\/mailrelay.com\/wp-content\/uploads\/2019\/05\/mailrelay-logo.jpg\",\"width\":613,\"height\":291,\"caption\":\"Mailrelay\"},\"image\":{\"@id\":\"https:\/\/mailrelay.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Mailrelay\/\",\"https:\/\/x.com\/mailrelay\",\"https:\/\/www.youtube.com\/mailrelay-email-marketing\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spear phishing - Mailrelay","description":"Spear phishing is a highly personalized phishing attack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Spear phishing - Mailrelay","og_description":"Spear phishing is a highly personalized phishing attack","og_url":"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/","og_site_name":"Mailrelay","article_publisher":"https:\/\/www.facebook.com\/Mailrelay\/","article_modified_time":"2025-02-07T19:56:35+00:00","twitter_card":"summary_large_image","twitter_site":"@mailrelay","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/","url":"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/","name":"Spear phishing - Mailrelay","isPartOf":{"@id":"https:\/\/mailrelay.com\/en\/#website"},"datePublished":"2025-01-28T20:06:38+00:00","dateModified":"2025-02-07T19:56:35+00:00","description":"Spear phishing is a highly personalized phishing attack","breadcrumb":{"@id":"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/mailrelay.com\/en\/glossary\/spear-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailrelay.com\/en\/"},{"@type":"ListItem","position":2,"name":"Spear phishing"}]},{"@type":"WebSite","@id":"https:\/\/mailrelay.com\/en\/#website","url":"https:\/\/mailrelay.com\/en\/","name":"Mailrelay","description":"Mailrelay.com - Email Marketing Software","publisher":{"@id":"https:\/\/mailrelay.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailrelay.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailrelay.com\/en\/#organization","name":"Mailrelay","url":"https:\/\/mailrelay.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailrelay.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mailrelay.com\/wp-content\/uploads\/2019\/05\/mailrelay-logo.jpg","contentUrl":"https:\/\/mailrelay.com\/wp-content\/uploads\/2019\/05\/mailrelay-logo.jpg","width":613,"height":291,"caption":"Mailrelay"},"image":{"@id":"https:\/\/mailrelay.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Mailrelay\/","https:\/\/x.com\/mailrelay","https:\/\/www.youtube.com\/mailrelay-email-marketing"]}]}},"uagb_featured_image_src":[],"uagb_author_info":{"display_name":"Mailrelay","author_link":"https:\/\/mailrelay.com\/en\/blog\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Spear phishing is a highly personalized phishing attack. The term &#8220;spear&#8221; refers to the fact that the attack is very specifically targeted, rather than casting a wide net like traditional phishing. This selective method creates emails that look legitimate, as the cyber attackers spend time researching the victim on social media, websites or even through&hellip;","_links":{"self":[{"href":"https:\/\/mailrelay.com\/en\/wp-json\/wp\/v2\/glossary\/83687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailrelay.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/mailrelay.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"version-history":[{"count":3,"href":"https:\/\/mailrelay.com\/en\/wp-json\/wp\/v2\/glossary\/83687\/revisions"}],"predecessor-version":[{"id":83855,"href":"https:\/\/mailrelay.com\/en\/wp-json\/wp\/v2\/glossary\/83687\/revisions\/83855"}],"wp:attachment":[{"href":"https:\/\/mailrelay.com\/en\/wp-json\/wp\/v2\/media?parent=83687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}