What Is Spear Phishing? A Targeted Attack Guide for Business
Spear phishing is a targeted form of phishing attack crafted specifically for the recipient, using personal information to appear legitimate. Unlike mass phishing campaigns, spear phishing targets a named individual using their role, relationships and current context. It is harder to spot, more likely to succeed and the entry point for the most damaging attacks on UK businesses.
Nathan Hill-Haimes
Technical Director
The Difference Between Phishing and Spear Phishing
Standard phishing sends the same message to thousands or millions of recipients, hoping that a small percentage will be fooled. The emails are generic — 'Your account has been suspended', 'You have a package waiting', 'Verify your password' — and obvious to anyone paying attention.
Spear phishing is fundamentally different. The attacker targets a specific individual and researches that person before crafting the email. The message references their actual name, their role, their colleagues, their current projects, their clients or recent public events relevant to their business. It appears to come from someone the recipient knows and trusts, regarding something they would plausibly be involved in.
The result is an email that looks convincingly legitimate — because it is built around real information about a real person.
How Attackers Research Their Targets
The reconnaissance phase of a spear phishing attack is increasingly systematic, and AI tools have made it faster. Attackers gather information from:
- LinkedIn: Role, responsibilities, reported-to relationships, recent activity, connections
- Company website: Team pages, recent news, client announcements, case studies
- Social media: Twitter/X, Instagram, Facebook — personal and professional activity
- Previous data breaches: Email address and password combinations from historical breaches confirm active email addresses
- Public company information: Companies House filings, press releases, procurement notices
A sophisticated attacker spending one hour on reconnaissance can build a detailed picture of a target's professional relationships, current projects and likely concerns — enough to craft a highly convincing email.
Common Spear Phishing Scenarios
Business Email Compromise (BEC)
The most financially damaging variant. The attacker impersonates a senior executive (CEO, Finance Director) and emails a finance team member with an urgent request to transfer funds to a new bank account. The email references real context — 'For the acquisition I mentioned in our call last week' — and uses pressure and urgency to discourage verification.
Over £4 million was stolen from UK law firms alone through BEC in a single reporting year, and financial businesses, professional services and large commercial organisations are equally targeted.
IT Help Desk Impersonation
The attacker impersonates the recipient's IT support team, referencing a specific software tool or system the target uses. The email asks the target to verify credentials, install a 'security update', or click a link to 'resolve an urgent account issue'.
Vendor and Invoice Fraud
The attacker impersonates a known supplier and sends a revised invoice with updated banking details. The email references recent real interactions with the vendor and uses plausible language. Without telephone verification of the change, payments are directed to the attacker's account.
Whaling
Whaling is spear phishing targeting senior executives specifically — 'whales' in criminal slang. These attacks are more resource-intensive but the potential payoff is higher: executives have authority over financial transactions, access to sensitive data and credibility for follow-on attacks against employees.
Why Spear Phishing Is Harder to Defend Against
Standard email filters excel at detecting generic phishing — known malicious domains, bulk sending patterns, generic content. Spear phishing attacks bypass many of these controls because:
- They are sent in small volumes or individually, avoiding bulk-sending reputation triggers
- They may come from legitimate email accounts (compromised legitimate accounts or lookalike domains that pass SPF checks)
- The content appears relevant and contextual rather than generic and suspicious
- They may not contain malicious links or attachments — some BEC attacks involve no technical payload at all, relying purely on social engineering
This is why AI-based behavioural email filtering — which analyses writing style, relationship history, and contextual anomalies — provides better protection against spear phishing than signature-based filtering.
Defences Against Spear Phishing
Technical Controls
- AI-based impersonation detection: Microsoft Defender for Office 365 and third-party email security platforms analyse email metadata, writing patterns and sender-recipient relationships to flag impersonation attempts even when technical indicators are absent
- DMARC with reject policy: Prevents attackers from sending emails that spoof your domain — so your staff cannot receive BEC emails purportedly from your own executives using your own domain
- Display name alerts: Configure your email platform to add a visible banner on emails that come from outside the organisation but display an internal name or the CEO's name as the display name
- MFA: Prevents compromised credentials (from earlier reconnaissance phishing) from being used to send spear phishing from legitimate accounts
Process Controls
- Payment verification procedure: Any request to change bank account details for a supplier or to make an urgent transfer must be verbally verified by telephone to a known number — never by replying to the email requesting the change
- Callback culture: Establish an organisational norm that verifying unexpected requests by phone is expected and not interpreted as distrust — it is a professional control, not an insult
- Training on spear phishing specifically: Generic phishing training does not prepare staff for the personalised nature of spear phishing. Training scenarios should include examples of targeted attacks using realistic personal information
Could Your Team Spot a Spear Phishing Email?
AMVIA's spear phishing simulation uses personalised, realistic scenarios to test your team's awareness — providing the data you need to target training where it matters most.
Frequently Asked Questions
Spear phishing targets any specific individual using personalised information. Whaling is a subset of spear phishing that specifically targets senior executives (CEOs, CFOs, board members) — the term reflects the larger potential payoff of targeting high-authority individuals who control financial transactions and sensitive data. Whaling attacks are typically more researched and more convincing than general spear phishing. <strong>Cybercrime cost (non-phishing):</strong> Average £990 per victim business (£1,970 excluding £0 responses). <em>(UK Government)</em>
Standard anti-spam filters are less effective against spear phishing because these attacks are low-volume, contextually relevant and may not contain traditional spam indicators like malicious links or attachments. AI-based email security that analyses behavioural patterns — sender-recipient relationship history, writing style anomalies, unusual urgency markers — provides significantly better detection of spear phishing than signature or reputation-based filtering. <strong>Phishing is the #1 attack type:</strong> 85% of businesses and 86% of charities that experienced a breach identified phishing as the cause (2025 survey). <em>(UK Government)</em>
Do not click any links or open any attachments. Do not reply to the email. If the email purports to be from a colleague or known contact, verify the request directly by phone using a number you already have (not one in the suspicious email). Report the email to your IT team or security provider, who can check whether others have received similar emails and block the sending domain if appropriate. <strong>Phishing was the most disruptive breach</strong> for 65% of businesses and 63% of charities. <em>(UK Government)</em>
DMARC with a reject policy prevents attackers from sending emails that exactly spoof your domain (e.g., ceo@yourcompany.co.uk). It does not prevent attacks using lookalike domains (ceo@your-company.co.uk) or display name spoofing (where the attacker uses a completely different domain but names the email 'Sarah Jones CEO'). DMARC is a necessary but not sufficient defence — AI-based impersonation detection and display name alerts address the remaining gaps. <strong>93% of cyber crimes against businesses</strong> and 95% against charities were phishing-based. <em>(UK Government)</em>
AI tools enable attackers to scale personalisation — generating individualised emails for hundreds of targets simultaneously by pulling in LinkedIn data, website information and social media content. AI can also be used to mimic writing styles, making an impersonation email more convincing by matching the vocabulary and tone of the person being impersonated. Deepfake audio generated by AI has also been used in vishing (voice phishing) attacks that impersonate executives in phone or voice message form. <strong>84% of SMBs</strong> that reported breaches faced phishing attacks. <em>(UK Government)</em>
Related Reading
Phishing Protection for UK Businesses | AMVIA Guide
The technical and training controls that protect against both generic phishing and targeted spear phishing.
Email Encryption for Business | AMVIA Guide
How email encryption works alongside anti-phishing controls for comprehensive email security.
Cybersecurity for Legal Firms | UK Law Firm Security Guide
Spear phishing and BEC are the leading cyber threats for UK law firms — this guide covers the specific defences needed.