
{"id":3148,"date":"2016-09-14T00:00:00","date_gmt":"2016-09-14T00:00:00","guid":{"rendered":"http:\/\/otava.test\/what-is-spear-phishing\/"},"modified":"2016-09-14T00:00:00","modified_gmt":"2016-09-14T00:00:00","slug":"what-is-spear-phishing","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/","title":{"rendered":"How to avoid spear phishing bait"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-16875\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg\" alt=\"Avoiding phishing scams\" width=\"350\" height=\"273\" \/>In the war against cybercriminals, we\u2019ve learned to block messages from people we don\u2019t know and avoid emails that have an excessive amount of capital letters, exclamation points and bad spelling. We\u2019ve also generally recognized that we sadly haven\u2019t come into a large fortune from a Nigerian prince if we just send him our financial information and a little bit of money.<\/p>\n<p>But what if the email is from someone you know, with their email address, a normal-sounding subject line, and a reference to the new car you bought last month? They\u2019re having money problems and need your help\u2014if you just go to their Kickstarter website and donate, it would really help them out. Should you do it?<\/p>\n<p>Nope. Not yet, anyway. That website your \u201cfriend\u201d asked you to go to help him out may look legit, but it\u2019s also a prime way to get malware installed on your computer without you even knowing. Suddenly, a stranger has access to your computer, your network and potentially your data, which spells big trouble.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_are_spear_phishing_attacks\"><\/span>What are spear phishing attacks?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Unfortunately, as we\u2019ve adapted, so have the criminals. This type of attack is known as spear phishing, and it\u2019s <a href=\"https:\/\/insights.samsung.com\/2016\/08\/30\/spear-phishing-attacks-increased-by-55-percent-in-2015\/\" target=\"_blank\" rel=\"noopener noreferrer\">more and more common<\/a>. It accounted for more than <a href=\"https:\/\/www.healthcareitnews.com\/news\/spear-phishing-caused-majority-2016-cyberattacks-ransomware-rising\" target=\"_blank\" rel=\"noopener noreferrer\">90 percent of cyberattacks<\/a> and resulting breaches in 2016, according to PhishMe&#8217;s 2016 Enterprise Phishing Susceptibility and Resiliency report.<\/p>\n<p>Spear phishing differs from phishing in that it is a more targeted approach criminals take to get you to click on a link or open an attachment that installs malware or <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-is-ransomware-and-how-do-you-protect-against-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware<\/a>. Using information commonly found on the internet (a Google search, or your social media profiles), they can craft an email that is tailored to your interests, from a trusted source, and sounds convincing enough that you do what they want.<\/p>\n<p>Cybercriminals tend to target more <a href=\"https:\/\/www.securityweek.com\/phishing-attacks-hit-c-suite-high-value-scams\" target=\"_blank\" rel=\"noopener noreferrer\">C-suite executives<\/a>, but don\u2019t think that just because you\u2019re a <a href=\"https:\/\/www.cnn.com\/2015\/04\/07\/politics\/how-russians-hacked-the-wh\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">lowly employee<\/a>, you aren\u2019t a target. Spear phishing campaigns are up 55 percent across the board. No matter who you are, you\u2019re liable to fall victim to spear phishing. It\u2019s wise to read every email carefully, think twice about posting potentially compromising information on social media, and be aware of what people are saying about you. The less information about you that\u2019s out there, the less criminals have to leverage against you if they get into your system through other means.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_does_spear_phishing_work\"><\/span>Why does spear phishing work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Spear phishing attacks are <a href=\"https:\/\/thirdcertainty.com\/infographics\/sophisticated-spear-phishing-attacks-becoming-more-common\/\" target=\"_blank\" rel=\"noopener noreferrer\">so successful<\/a>\u00a0in part because email filters are slow to catch on to the attempts. Hackers can make an email appear to be from a trusted source such as a friend, coworker, or government agency. The links the emails ask you to click on may have a legitimate sounding domain name, such as a crowd-funding or news site. The other reason they are so successful is because they are compelling enough for people to open and click on them. Organizations such as <a href=\"https:\/\/www.healthdatamanagement.com\/news\/wyoming-hospital-hit-by-phishing-attack\" target=\"_blank\" rel=\"noopener noreferrer\">hospitals<\/a>,\u00a0<a href=\"https:\/\/www.deseretnews.com\/article\/865660313\/Spear-phishing-scam-takes-Utah-counties-for-thousands-of-dollars.html?pg=all\" target=\"_blank\" rel=\"noopener noreferrer\">government agencies<\/a>, and even the <a href=\"https:\/\/news.netcraft.com\/archives\/2014\/12\/17\/icann-hit-by-successful-spear-phishing-attack.html\" target=\"_blank\" rel=\"noopener noreferrer\">Internet<\/a> itself\u00a0have been hit with successful spear phishing attacks.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_you_avoid_spear_phishing\"><\/span>How do you avoid spear phishing?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you aren\u2019t sure whether an email you received is real, the best way to verify it is by calling the sender to find out what\u2019s going on. Remember, legitimate businesses or government agencies will never ask you for your password or financial information. Once you\u2019ve verified that the email is real, feel free to do whatever you like with it. Until then, it\u2019s best to keep it at bay and keep from clicking on any links.<\/p>\n<p>Another tactic is to run simulated phishing campaigns within organization. Have your IT department send out a fake email (or emails) and see how many employees click on the link or download the attachment. Knowing who is more likely to click on a real phishing email and training them to read it differently can reduce the likelihood of an attacker entering your systems through phishing.<\/p>\n<p>They say an ounce of prevention is worth a pound of cure, and that adage rings extremely true with spear phishing and cybersecurity. Once your data is lost, it\u2019s lost for good, so keeping it from escaping in the first place goes a long way toward a solid security strategy.<\/p>\n<p>Spear phishing, combined with other types of attacks such as ransomware, are becoming more and more prevalent. It\u2019s important to be careful when opening emails, even if you know the sender. Be sure to verify with the person or company any emails that ask you for money or personal information. Vigilance and a healthy dose of skepticism go a long way toward preventing you and\/or your employer from becoming victims of a spear phishing attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the war against cybercriminals, we\u2019ve learned to block messages from people we don\u2019t know and avoid emails that have an excessive amount of capital letters, exclamation points and bad spelling. We\u2019ve also generally recognized that we sadly haven\u2019t come into a large fortune from a Nigerian prince if we just send him our financial information and a little bit of money. But what if the email is from someone you know, with their email address, a normal-sounding subject line, and a reference to the new car you bought last month? They\u2019re having money problems and need your help\u2014if you just go to their Kickstarter website and donate, it would really help them out. Should you do it? Nope. Not yet, anyway. That website your \u201cfriend\u201d asked you to go to help him out may look legit, but it\u2019s also a prime way to get malware installed on your computer without you even knowing. Suddenly, a stranger has access to your computer, your network and potentially your data, which spells big trouble. What are spear phishing attacks? Unfortunately, as we\u2019ve adapted, so have the criminals. This type of attack is known as spear phishing, and it\u2019s more and more common&#8230;.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-3148","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to avoid spear phishing bait | OTAVA<\/title>\n<meta name=\"description\" content=\"spear phishing accounted for more than 90 percent of cyberattacks and resulting breaches in 2016, according to PhishMe&#039;s 2016 report.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to avoid spear phishing bait\" \/>\n<meta property=\"og:description\" content=\"spear phishing accounted for more than 90 percent of cyberattacks and resulting breaches in 2016, according to PhishMe&#039;s 2016 report.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-14T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"How to avoid spear phishing bait\",\"datePublished\":\"2016-09-14T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/\"},\"wordCount\":797,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/\",\"url\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/\",\"name\":\"How to avoid spear phishing bait | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg\",\"datePublished\":\"2016-09-14T00:00:00+00:00\",\"description\":\"spear phishing accounted for more than 90 percent of cyberattacks and resulting breaches in 2016, according to PhishMe's 2016 report.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to avoid spear phishing bait\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to avoid spear phishing bait | OTAVA","description":"spear phishing accounted for more than 90 percent of cyberattacks and resulting breaches in 2016, according to PhishMe's 2016 report.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/","og_locale":"en_US","og_type":"article","og_title":"How to avoid spear phishing bait","og_description":"spear phishing accounted for more than 90 percent of cyberattacks and resulting breaches in 2016, according to PhishMe's 2016 report.","og_url":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/","og_site_name":"OTAVA","article_published_time":"2016-09-14T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"How to avoid spear phishing bait","datePublished":"2016-09-14T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/"},"wordCount":797,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/","url":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/","name":"How to avoid spear phishing bait | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg","datePublished":"2016-09-14T00:00:00+00:00","description":"spear phishing accounted for more than 90 percent of cyberattacks and resulting breaches in 2016, according to PhishMe's 2016 report.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/phishing_61026517.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/what-is-spear-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"How to avoid spear phishing bait"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=3148"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3148\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=3148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=3148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=3148"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=3148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}