🎯

Spear Phishing

Targeted phishing attacks using personal information to appear more legitimate.

Auf diesen Betrug prüfen

Fügen Sie verdächtigen Text, Link oder Nachricht zum Analysieren ein

Wie dieser Betrug funktioniert

Schritt 1

Attacker researches victim using social media, LinkedIn, company website

Schritt 2

Crafts personalized email mentioning your name, job, colleagues, or recent activities

Schritt 3

Uses urgency or authority (fake boss email) to trick you into action

So schützen Sie sich

  • Verify unexpected requests through other channels
  • Be suspicious of urgent requests
  • Check email headers
  • Report to IT security

Häufig gestellte Fragen

What is Spear Phishing?

Targeted phishing attacks using personal information to appear more legitimate.

How does Spear Phishing work?

Attacker researches victim using social media, LinkedIn, company website Crafts personalized email mentioning your name, job, colleagues, or recent activities Uses urgency or authority (fake boss email) to trick you into action

How can I protect myself from Spear Phishing?

Verify unexpected requests through other channels Be suspicious of urgent requests Check email headers Report to IT security

Alle Fragen anzeigen →