{"id":31471,"date":"2022-11-23T09:10:49","date_gmt":"2022-11-23T09:10:49","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=31471"},"modified":"2025-05-28T20:38:18","modified_gmt":"2025-05-28T20:38:18","slug":"seven-examples-of-spear-phishing-attacks","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/","title":{"rendered":"7 Examples of Spear Phishing Attacks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The year 2022 isn\u2019t over yet, but over <\/span><a href=\"https:\/\/www.securitymagazine.com\/articles\/98536-over-255m-phishing-attacks-in-2022-so-far#:~:text=SlashNext%20analyzed%20billions%20of%20link,phishing%20attacks%20compared%20to%202021.\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">255 million<\/span><\/a><span style=\"font-weight: 400;\"> phishing attacks have already been reported. Scary to know, right?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With more than ten <\/span><a href=\"https:\/\/easydmarc.com\/blog\/12-types-of-phishing-attacks-and-how-to-identify-them\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">phishing attack<\/span><\/a><span style=\"font-weight: 400;\"> variations and even more sophisticated techniques, understanding and preventing such cybercrimes has become crucial. This blog focuses on <\/span><b>spear phishing examples<\/b><span style=\"font-weight: 400;\"> and types.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Spear phishing is a campaign targeted toward a particular individual, group, or organization. The typical intentions include stealing data for malicious activities, spreading malware, and hurting an organization.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do you know most spear phishers work when their victims also work to get a quick response? However, they may also send emails or messages on weekends when you\u2019re more likely to be engaged with friends and family. They design them so that you proceed with the request without reading the red flags or overthinking.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, read the below-shared real-life <\/span><b>spear phishing examples<\/b><span style=\"font-weight: 400;\"> to identify red flags.<\/span><\/p>\n<h2><b>Spear Phishing Types<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Targeted spear <\/span><a href=\"https:\/\/easydmarc.com\/blog\/phishing-attacks-recognize-and-avoid-email-phishing\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">phishing attacks<\/span><\/a><span style=\"font-weight: 400;\"> are soaring in volume, complexity, and the impact they leave on businesses. Threat actors design phishing emails in a way that they pass security checks and look like they originate from a legitimate sender.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These email exploits are categorized into three major categories. We\u2019ve also included some <\/span><b>real-life spear phishing examples<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>Business Email Compromise<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2021_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">the FBI<\/span><\/a><span style=\"font-weight: 400;\">, the total losses incurred due to BEC attacks in 2020 was a whopping $1.8 billion!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In business email compromise or BEC, cyberactors target a business to defraud and cause billions of dollars in potential losses. Irrespective of size and capacity, this is a prevalent issue amongst many industries and organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a BEC attack, a hacker impersonates someone you know (usually a colleague, boss, vendor, or colleague) and sends requests to wire money, divert payrolls, change banking details for future payments, etc. These attacks are challenging to detect as they don\u2019t use malware or malicious links.<\/span><\/p>\n<h4><b>Spear Phishing Real Life Example #1: BEC Attack on Google and Facebook Worth $122 million<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Between 2013 and 2015, <\/span><a href=\"https:\/\/www.techworm.net\/2019\/03\/man-facebook-google-fake-invoices.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Evaldas Rimasauskas<\/span><\/a><span style=\"font-weight: 400;\"> impersonated a Taiwanese hardware supplier, Quanta Computer, whose services were used by two tech giants, Google and Facebook. He sent out fake invoices worth $122 million ($99 million and $23 million to Google and Facebook, respectively) to these companies for almost three years until he was arrested and prisoned for 30 years.<\/span><\/p>\n<h3><b>Whaling<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In whaling, malicious actors attack senior employees like CEOs or CFOs to obtain sensitive details crucial to their company. They can also manipulate lower-level employees to authorize high-value wire transfers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like business email compromise, it\u2019s challenging to detect whaling attacks as they seem legitimate and don\u2019t require victims to click on malicious links. The best way to avoid them is to have management personnel undergo information security awareness training. Financial or informational requests should also be confirmed directly.<\/span><\/p>\n<h4><b>Spear Phishing Real Life Example #2: CEO of FACC Fired For His Part in a Whaling Attack<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">FACC, an <\/span><a href=\"https:\/\/www.pindrop.com\/article\/ceo-facc-fired-after-email-scam\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Austrian aerospace manufacturer, lost \u20ac50 million in a whaling attack<\/span><\/a><span style=\"font-weight: 400;\"> and later fired its CEO, Walter Stephan, and other employees over the incident. The scammers impersonated an executive or finance official to manipulate the victim into wiring a hefty sum from the company\u2019s accounts to theirs.<\/span><\/p>\n<h3><b>CEO Fraud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">CEO fraud is a scam where phishers spoof a company\u2019s email accounts and mimic executives (typically in accounting or HR) to trick the company&#8217;s CEO. They manipulate them into making unauthorized wire transfers or sharing sensitive details related to banking, tax, etc.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Threat actors try social techniques like display name spoofing, which uses thats different email addresses but the same display name. This trick often works because mail providers don\u2019t display the sender\u2019s email address by default on mobile devices.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another tactic involves email spoofing, where hackers use both the CEO\u2019s name and the correct email address. The hackers use a different reply-to address, so the response email goes to them.<\/span><\/p>\n<h4><b>Spear Phishing Real Life Example #3: CEO Fraud with French Cinema, Path\u00e9 Costs \u20ac19.2 Million<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Another infamous <\/span><b>example of a spear phishing email<\/b><span style=\"font-weight: 400;\"> is when France\u2019s leading cinema group, Path\u00e9, lost \u20ac19.2 million when several emails were sent from the personal account of CEO Marc Lacan. The emails requested to transfer the sum in four ranches to Towering Stars General Trading LLC in Dubai. The incident was followed by Lacan stepping down from the position.<\/span><\/p>\n<h2><b>4 More Spear Phishing Examples<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">You may think detecting and preventing spear phishing attacks is easy, but that isn\u2019t the case. Scammers are becoming more sophisticated and organized in planning and executing cyberattacks. We\u2019ve shared five <\/span><b>spear phishing examples<\/b><span style=\"font-weight: 400;\"> to help you understand their tactics.<\/span><\/p>\n<h3><b>#1: Spoofed Emails Caused a Loss of $46.7 Million to Ubiquiti Networks Inc.<\/b><\/h3>\n<p><a href=\"https:\/\/www.theregister.com\/2015\/08\/09\/ubiquiti_stung_by_email_spoofing_fraud\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Ubiquiti Networks Inc<\/span><\/a><span style=\"font-weight: 400;\">, an American network technology company, became a victim of spear phishing when its employees were tricked by hackers. The bad actors impersonated an outside entity and some high-level employees. Targeting the finance team, they requested wire transfers totaling $46.7 million.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company\u2019s audit committee and external advisers found significant weaknesses in Ubiquiti\u2019s internal controls regarding financial reporting. The CFO also resigned.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This wrecking incident proves how easy it has become for threat actors to imitate an individual. They use information readily available on the internet to create realistic spoofed emails.<\/span><\/p>\n<h3><b>#2: Attackers Sent Well-Crafted Emails to EMC Corp\u2019s Junior-Level Employees to Initiate a Zero-Day Exploit<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Another hair-raising<\/span><b> spear phishing example<\/b><span style=\"font-weight: 400;\"> involved the <\/span><span style=\"font-weight: 400;\">RSA security group of EMC Corp<\/span><span style=\"font-weight: 400;\">, the cloud computing and big data giant. In 2011, RSA was targeted when hackers used a Flash file secretly embedded in an Excel file attached to an email. The attachment was named \u20182011 Recruitment Plan\u2019 and sent to a small group of junior-level employees.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The hackers used a then-unknown Adobe zero-day exploit to install a remote administration tool (RAT) on victims\u2019 computers.\u00a0 This incident shows beyond a doubt that cybersecurity training and employee awareness is vital.<\/span><\/p>\n<h3><b>#3: Fake Invoices of $8.7 Million Ends Up Closing Down Sydney Hedge Fund<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In November 2020, the <\/span><a href=\"https:\/\/www.afr.com\/companies\/financial-services\/hacked-sydney-hedge-fund-part-of-170m-cyber-crime-spree-20201123-p56h24\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">co-founder of Australian hedge fund Levitas Capital <\/span><\/a><span style=\"font-weight: 400;\">received an email with a fake Zoom meeting link. The link planted malware allowing hackers to send impersonated emails and fake invoices totalling $8.7 million. While the d fraudsters could only get away with $800,000, the hedge fund closed down after the attack.<\/span><\/p>\n<h3><b>#4: Government of Puerto Rico Fell Victim to Spear Phishing Attack Stealing Over $4 Million\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In 2019, scammers hacked an employee&#8217;s computer in the finance department and sent emails to multiple government agencies alleging a change in bank accounts. Two agencies proceeded with the request, out of which one lost\u00a0 <\/span><a href=\"https:\/\/www.nbcnews.com\/news\/latino\/puerto-rico-says-it-was-scammed-out-2-6-million-n1136191\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">$63,000 in December and more than $2.6 million in January, <\/span><\/a><span style=\"font-weight: 400;\">and the other sent $1.5 million in January.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This <\/span><b>spear phishing email example<\/b><span style=\"font-weight: 400;\"> proves that private companies and government entities should also train their employees to identify red flags and proceed only after confirming such requests in person.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Spear phishing is a common data breach method that poses a real threat as it can bypass security filters. Training yourself and your employees about cyber hygiene is the best preventive measure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From the <\/span><b>spear phishing examples<\/b><span style=\"font-weight: 400;\"> above, it\u2019s crucial to take measures to block, filter, and flag suspicious emails. Also, be mindful of strange and dubious email requests from coworkers, supervisors, banks, merchants, etc. Use our free <\/span><a href=\"https:\/\/easydmarc.com\/tools\/phishing-url\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">phishing URL checker<\/span><\/a><span style=\"font-weight: 400;\"> that provides you with real-time results to help you detect if the URL in an email is legitimate or a phishing link.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The year 2022 isn\u2019t over yet, but over &#8230;<\/p>\n","protected":false},"author":1,"featured_media":31472,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,290,199,293,289],"tags":[],"class_list":["post-31471","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-phishing","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>7 Examples of Spear Phishing Attacks | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Curious about spear phishing examples? These attacks target a particular individual, group, or organization. Learn about some real-life incidents and more here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Examples of Spear Phishing Attacks\" \/>\n<meta property=\"og:description\" content=\"Curious about spear phishing examples? These attacks target a particular individual, group, or organization. Learn about some real-life incidents and more here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-23T09:10:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T20:38:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/November-International-Fraud-Awareness-Week.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"7 Examples of Spear Phishing Attacks\",\"datePublished\":\"2022-11-23T09:10:49+00:00\",\"dateModified\":\"2025-05-28T20:38:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/\"},\"wordCount\":1215,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/November-International-Fraud-Awareness-Week.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Phishing\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/\",\"name\":\"7 Examples of Spear Phishing Attacks | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/November-International-Fraud-Awareness-Week.jpg\",\"datePublished\":\"2022-11-23T09:10:49+00:00\",\"dateModified\":\"2025-05-28T20:38:18+00:00\",\"description\":\"Curious about spear phishing examples? These attacks target a particular individual, group, or organization. Learn about some real-life incidents and more here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/November-International-Fraud-Awareness-Week.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/November-International-Fraud-Awareness-Week.jpg\",\"width\":1440,\"height\":910,\"caption\":\"November International Fraud Awareness Week\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/seven-examples-of-spear-phishing-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Phishing\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/phishing\\\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"7 Examples of Spear Phishing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"7 Examples of Spear Phishing Attacks | EasyDMARC","description":"Curious about spear phishing examples? These attacks target a particular individual, group, or organization. Learn about some real-life incidents and more here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"7 Examples of Spear Phishing Attacks","og_description":"Curious about spear phishing examples? These attacks target a particular individual, group, or organization. Learn about some real-life incidents and more here.","og_url":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-11-23T09:10:49+00:00","article_modified_time":"2025-05-28T20:38:18+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/November-International-Fraud-Awareness-Week.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"7 Examples of Spear Phishing Attacks","datePublished":"2022-11-23T09:10:49+00:00","dateModified":"2025-05-28T20:38:18+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/"},"wordCount":1215,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/November-International-Fraud-Awareness-Week.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Phishing","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/","url":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/","name":"7 Examples of Spear Phishing Attacks | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/November-International-Fraud-Awareness-Week.jpg","datePublished":"2022-11-23T09:10:49+00:00","dateModified":"2025-05-28T20:38:18+00:00","description":"Curious about spear phishing examples? These attacks target a particular individual, group, or organization. Learn about some real-life incidents and more here.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/November-International-Fraud-Awareness-Week.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/November-International-Fraud-Awareness-Week.jpg","width":1440,"height":910,"caption":"November International Fraud Awareness Week"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/seven-examples-of-spear-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"Phishing","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/phishing\/"},{"@type":"ListItem","position":7,"name":"7 Examples of Spear Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/11\/November-International-Fraud-Awareness-Week.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/31471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=31471"}],"version-history":[{"count":3,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/31471\/revisions"}],"predecessor-version":[{"id":48029,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/31471\/revisions\/48029"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/31472"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=31471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=31471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=31471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}