{"id":88,"date":"2021-01-21T10:51:00","date_gmt":"2021-01-21T05:21:00","guid":{"rendered":"http:\/\/signals.dmarcsonar.com\/?p=88"},"modified":"2021-04-04T09:30:28","modified_gmt":"2021-04-04T04:00:28","slug":"spear-phishing-used-for-cyber-attacks-against-top-institutions","status":"publish","type":"post","link":"https:\/\/www.tikaj.com\/blog\/spear-phishing-used-for-cyber-attacks-against-top-institutions\/","title":{"rendered":"Spear Phishing Used for Cyber Attacks against Top Institutions"},"content":{"rendered":"

To users, spear phishing emails may seem like innocent requests for information or other forms of benign contact, potentially appearing to even come from a person or company a user is friendly or familiar with. But for attackers, spear phishing emails are most often the best way to get the keys to the kingdom.
\nMost people are familiar with phishing \u2013 an attempt to obtain user credentials, financial data, or other sensitive information by emulating a legitimate email communication. The information gathered can be sold on the black market, or used directly for theft, further fraud, or in some cases, blackmail.
\nSpear phishing, on the other hand, is a type of targeted phishing in which an attacker first researches the target individual or company to increase their chance of success. Because this allows the attacker to appear more trustworthy as a legitimate business entity, users are less suspicious. This added level of comfort represents a much greater threat than untargeted, mass spam or phishing emails.
\nIn fact, a recent study conducted by Vanson Bourne (sponsored by SecureItlab), 300 firms in the US and UK reported that 38% of cyber attacks in the past 12 months came from spear phishing.
\nIn the past two years, many of the highest profile and most damaging data breaches have started with attackers getting into networks via a successful spear phishing email. This form of entry applies to both for profit attacks as well as state-sponsored hacks on government targets and private businesses.
\nTo illustrate the seriousness of spear phishing threats, here, in no particular order, are top ten targeted security breaches that began with spear phishing:<\/p>\n

For Profit Attacks \u2013 Spear Phishing<\/strong><\/h2>\n