{"id":90238,"date":"2019-12-02T09:00:15","date_gmt":"2019-12-02T17:00:15","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90238"},"modified":"2023-09-26T09:09:18","modified_gmt":"2023-09-26T16:09:18","slug":"spear-phishing-campaigns-sharper-than-you-think","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/12\/02\/spear-phishing-campaigns-sharper-than-you-think\/","title":{"rendered":"Spear phishing campaigns\u2014they\u2019re sharper than you think"},"content":{"rendered":"

Even your most security-savvy users may have difficulty identifying honed spear phishing campaigns. Unlike traditional phishing campaigns that are blasted to a large email list in hopes that just one person will bite, advanced spear phishing campaigns are highly targeted and personal. They are so targeted, in fact, that we sometimes refer to them as \u201claser\u201d phishing. And because these attacks are so focused, even tech-savvy executives and other senior managers have been duped into handing over money and sensitive files by a well-targeted email. That\u2019s how good they are.<\/p>\n

Even though spear phishing campaigns can be highly effective, they aren\u2019t foolproof. If you understand how they work, you can put measures in place to reduce their power. Today, we provide an overview of how these campaigns work and steps you can take to better protect your organization and users.<\/p>\n

\"Graph<\/a><\/p>\n

Figure 1. Percentage of inbound emails associated with phishing on average increased in the past year, according to Microsoft security research (source: <\/em>Microsoft Security Intelligence Report<\/em><\/a>).<\/em><\/p>\n

Step 1: Select the victims<\/h3>\n

To illustrate how clever some of these campaigns are, imagine a busy recruiter who is responsible for filling several IT positions. The IT director is under a deadline and desperate for good candidates. The recruiter posts the open roles on their social networks asking people to refer leads. A few days later they receive an email from a prospective candidate who describes the role in the email. The recruiter opens the attached resume and inadvertently infects their computer with malware. They have just been duped by a spear phisher.<\/p>\n

How did it happen?<\/strong><\/p>\n

In a spear phishing campaign, the first thing an attacker needs to do is identify the victims. These are typically individuals who have access to the data the attacker wants. In this instance, the attackers want to infiltrate the human resources department because they want to exfiltrate employee social security numbers. To identify potential candidates they conduct extensive research, such as:<\/p>\n