What is phishing?
Phishing is a common social engineering attack that tries to trick people into revealing sensitive information (like passwords) or taking unsafe actions (like opening a malicious attachment). If you want a deeper breakdown of phishing tactics, examples, and warning signs, see our pillar page: Phishing: What it is and how to spot it.
This article focuses on how phishing differs from spear phishing—and why that distinction matters for modern organizations.
What tactics and channels does phishing use?
Phishing is typically high-volume and designed to reach as many people as possible. Attackers use generic messages that create pressure—often with urgency or fear—to push quick decisions. Common channels include email, SMS, social platforms, and fake login pages. While the messaging is broad, it often relies on the same building blocks:
- urgent or threatening language to trigger fast action,
- links to lookalike websites that collect credentials,
- attachments that attempt to deliver malware,
- generic greetings and vague context.
What goals and targets does phishing pursue?
Most phishing campaigns aim for scale: steal credentials, trigger payments, or harvest information that can be reused for fraud. Because phishing is automated and broad, targets are usually “anyone who clicks,” which is why baseline security controls and user awareness training are so effective at reducing risk.
Do you want to learn more about phishing? Read our article: What is Phishing?
What is spear phishing?
Spear phishing is a targeted version of phishing aimed at a specific person, team, or organization. Instead of sending thousands of identical messages, attackers tailor content using details about the recipient—like their role, recent projects, coworkers, vendors, or internal terminology—to make the message feel legitimate.
This personalization is what makes spear phishing more dangerous: it often looks like a normal work request, not a random scam.
What tactics and personalization does spear phishing use?
Spear phishing depends on research and credibility. Attackers pull information from public sources (social media, company pages) and sometimes from previously compromised inboxes to craft believable messages. Common tactics include:
- using the target’s name, role, and real context (“about that invoice / meeting / project”),
- impersonating a trusted internal contact or vendor,
- thread hijacking (replying inside an existing email conversation),
- requesting “quick approval” or “urgent action” that bypasses normal checks.
In some cases, spear phishing escalates into Business Email Compromise (BEC) when attackers impersonate executives or finance workflows to redirect payments.
What high-value objectives does spear phishing aim for?
Spear phishing usually targets higher-value outcomes than generic phishing. Objectives often include:
- access to corporate accounts or internal systems,
- financial fraud (wire/ACH redirection, invoice manipulation),
- stealing sensitive documents or data,
- gaining a foothold for broader compromise.
What are the key differences between phishing and spear phishing?
The difference is mainly scale vs. precision.
- Phishing: broad, generic, high volume, minimal research, aims for “someone will bite.”
- Spear phishing: targeted, personalized, lower volume, higher research, aims for specific access or outcomes.
Both can be dangerous, but spear phishing is often harder to detect because it blends into real workflows and relationships.
What differences exist in targeting and research requirements?
Phishing relies on mass outreach and simple templates. Spear phishing relies on research: the attacker gathers details about the target and crafts a message that fits their role and context. The more tailored the message, the more likely it is to bypass suspicion.
What differences exist in message style and volume?
Phishing messages are usually generic and sent at scale. Spear phishing messages are fewer, more specific, and written to look like normal business communication—often matching internal tone, formatting, and timing.
What differences exist in attack objectives and impact?
Phishing commonly aims for credentials or quick fraud at scale. Spear phishing commonly aims for access, sensitive data, or high-value transactions. As a result, spear phishing incidents can lead to larger breaches, bigger financial losses, and deeper operational disruption.
How do social engineering and email attacks enable phishing and spear phishing?
Both attack types rely on social engineering: manipulating trust, urgency, fear, or authority to trigger action. Email remains a primary channel because it’s central to business operations and can be spoofed, compromised, or imitated convincingly.
The practical takeaway: technical controls help, but process discipline matters too—especially when money, credentials, or sensitive data are involved.
What role do malicious links and zero-day attacks play?
Malicious links often lead to credential-harvesting pages or malware downloads. In more advanced cases, attackers may exploit zero-day vulnerabilities to compromise devices even when users don’t knowingly install something. These tactics increase the success rate of targeted attacks, especially when layered with convincing spear phishing narratives.
What is Business Email Compromise and CEO fraud?
Business Email Compromise (BEC) is a targeted scam that uses impersonation (often executives, finance staff, or vendors) to redirect payments or obtain sensitive information. CEO fraud is a common BEC pattern where attackers impersonate leadership to demand urgent transfers or confidential actions.
Because BEC exploits real workflows, strong verification procedures—like confirming payment changes via a trusted channel—are essential defenses.
How can organizations and individuals detect phishing and spear phishing?
Detection improves when organizations combine technical controls with strong user habits. Key layers include:
- email authentication (SPF, DKIM, DMARC) to reduce spoofing,
- filtering and link protection to block known malicious content,
- training so users recognize urgency + unusual requests,
- reporting pathways so suspicious messages are escalated quickly.
What email security protocols (SPF, DKIM, DMARC) improve detection?
SPF defines which mail servers can send on behalf of a domain, DKIM adds a cryptographic signature to help prove integrity, and DMARC sets enforcement rules and reporting when authentication fails. Together, they reduce spoofing and improve visibility into abuse.
How can user awareness and training reduce risk?
Training helps people slow down, verify requests, and recognize common manipulation cues (urgency, secrecy, payment changes, unusual links). A strong program also encourages reporting—because fast reporting can stop an attack before it spreads.
How can you protect against phishing and spear phishing?
Strong protection comes from layered controls and consistent processes:
- use MFA on email and key systems,
- deploy SPF/DKIM/DMARC and strong email filtering,
- verify sensitive requests via a trusted secondary channel,
- train users regularly and run realistic simulations,
- keep systems patched and endpoints protected.
What technical controls mitigate phishing threats?
Core controls include email authentication (SPF/DKIM/DMARC), secure email gateways, endpoint protection, patching, and account protections like MFA. These reduce both spoofing-based attacks and the blast radius of compromised credentials.
What best practices strengthen organizational defenses?
Establish clear verification steps for credential resets, vendor payment changes, and urgent financial requests. Pair that with routine training, easy reporting, and an incident response playbook so people know exactly what to do when something feels off.
What individual actions prevent identity theft and data breach?
- don’t click unknown links or open unexpected attachments,
- verify unusual requests through a known channel,
- use unique passwords and a password manager,
- turn on MFA wherever possible,
- report suspicious messages quickly.
Contact Us Today To Schedule Your Discovery Call
15min discovery call Schedule 15min discovery callOr submit a message
Thank you for contacting us!
We respond within 24 hours