Spear Phishing
Targeted phishing attacks using personal information to appear more legitimate.
Spear Phishing in one clear explanation
Targeted phishing attacks using personal information to appear more legitimate.
- Attacker researches victim using social media, LinkedIn, company website
- Crafts personalized email mentioning your name, job, colleagues, or recent activities
- Первое действие: Verify unexpected requests through other channels
Проверить на этот скам
Вставьте подозрительный текст, ссылку или сообщение для анализа
Как работает этот скам
Attacker researches victim using social media, LinkedIn, company website
Crafts personalized email mentioning your name, job, colleagues, or recent activities
Uses urgency or authority (fake boss email) to trick you into action
Как защитить себя
- ✓ Verify unexpected requests through other channels
- ✓ Be suspicious of urgent requests
- ✓ Check email headers
- ✓ Report to IT security
Часто задаваемые вопросы
What is Spear Phishing?
Targeted phishing attacks using personal information to appear more legitimate.
How does Spear Phishing work?
Attacker researches victim using social media, LinkedIn, company website Crafts personalized email mentioning your name, job, colleagues, or recent activities Uses urgency or authority (fake boss email) to trick you into action
How can I protect myself from Spear Phishing?
Verify unexpected requests through other channels Be suspicious of urgent requests Check email headers Report to IT security