🎯

Spear Phishing

Targeted phishing attacks using personal information to appear more legitimate.

Verificar esta estafa

Pegue texto, enlace o mensaje sospechoso para analizar

Cómo funciona esta estafa

Paso 1

Attacker researches victim using social media, LinkedIn, company website

Paso 2

Crafts personalized email mentioning your name, job, colleagues, or recent activities

Paso 3

Uses urgency or authority (fake boss email) to trick you into action

Cómo protegerse

  • Verify unexpected requests through other channels
  • Be suspicious of urgent requests
  • Check email headers
  • Report to IT security

Preguntas frecuentes

What is Spear Phishing?

Targeted phishing attacks using personal information to appear more legitimate.

How does Spear Phishing work?

Attacker researches victim using social media, LinkedIn, company website Crafts personalized email mentioning your name, job, colleagues, or recent activities Uses urgency or authority (fake boss email) to trick you into action

How can I protect myself from Spear Phishing?

Verify unexpected requests through other channels Be suspicious of urgent requests Check email headers Report to IT security

Ver todas las preguntas →