Updated:

The Concept behind Spear Phishing Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Article Summary

In this article, the author explains the concept behind spear phishing, which is the method through which hackers access people’s passwords and other private information. Martin starts by making a simple yet profound statement – “When it comes to cyber-attacks, the most common method of gaining access to your passwords and information may surprise you- it is just by asking for it”.

While hackers can use a myriad of sophisticated techniques to access a person’s information, tricking users into sharing their information in an easy and straightforward way of achieving the same objective. According to Martin, spear phishing is an “e-mail communication or some other type of electronic communications scam that targets individuals, organizations or businesses through content that looks like it is coming from a legitimate source”. Through this technique, cybercriminals social engineer e-mails to appear like legitimate sources.

Social engineering is an insidious art that hackers use to manipulate people by using domains and content that look like trusted sources. In this case, a hacker will send a malicious link or document leading to a fake login site and the moment users enter their credentials, such details are stolen and used for other criminal activities. Martin notes that this phishing technique, in some cases, is so accurate to the originals that even the most careful users have fallen victim. The author gives a recent example of spear phishing by two Russian hackers, APT28 and Sandworm Team, aimed at European governments.

These groups have also targeted other organizations and media outlets in Russia, Germany, and France. According to Martin, targets in European governments are normally sent malicious e-mails containing links that appear to direct to government websites. Additionally, the sender of such e-mails appears legitimate and once the targeted users click on the links, they are prompted to change their passwords and enter other personal information, which is then stolen.

Importance of this Issue

It is important to understand the issue of spear-phishing because its impacts on individuals and corporations are enormous. According to Gendre, the cost of a breach that occurs through spear-phishing is stunning as it goes beyond monetary loss. Once one employee becomes a victim of this trick, the entire corporation is at risk. The affected companies suffer reputational damage once the public learns about such phishing attacks. A reputable brand could be perceived as untrustworthy for customers, shareholders, and even employees. This aspect could lead to huge financial losses because negative brand effects from a phishing attack can potentially affect a company’s market capitalization leading to huge losses.

Intellectual property loss is another possible effect of spear-phishing on companies through stolen trade secrets, formulas, customer lists, and costly research. Gender posits, “For firms like technology, defense, or pharmaceutical a single design or drug patent could easily represent millions, or billions, in sunk research costs”. Such losses are unprecedented and they can lead to the closure of a business. Additionally, other direct costs are associated with spear phishing, such as fines levied by regulatory bodies when such incidences occur.

This issue is also important due to its pervasive and widespread nature. Many people are likely to become victims of spear phishing because the tricks are difficult to detect. According to cyber security professionals, Kelley and Kathuria, even the most “security-savvy” users may be exposed to honed spear-phishing techniques. Such phishing tricks are highly targeted and personal to be easily detected. In a study to assess the susceptibility of Internet users to spear-phishing campaigns, Lin et al. found out that out of 100 participants, 43 percent fell victim to simulated spear-phishing e-mails. Swinhoe notes that the effectiveness of “spear-phishing comes down to a combination of both technical and psychological reasons”. Such high levels of susceptibility to these scams are worrying, hence the importance of understanding this issue.

I found this article interesting and informative at the same time because the author uses simple and straightforward language to explain the concept of spear phishing. Martin discusses this pervasive cybercrime threat in a way that can be understood even by people not trained in Internet security. Additionally, the author gives relatable examples of how this technique is being used in contemporary times.

The example of how Russian groups are using spear-phishing to infiltrate European governments and media outlets is relatable and it underscores the pervasive nature of this technique. The issue of phishing arose in the course material under the topic of Information Attacks and Defenses. Specifically, the sub-topic of “Social Engineering Problem” explains the underlying principles of spear phishing. According to the course material, social engineering involves tricking an individual into giving personal credentials, which are then used to compromise a system’s security.

The information provided in the main article, course materials, and other references used in this paper indicates the pervasive nature of spear phishing. In the course material, different examples of phishing by e-mail are given, such as the one involving a fraudulent e-mail allegedly sent by Chase Bank’s customer service to an account owner seeking identity verification. Gender gives a similar example but uses FedEx company.

Additionally, Swinhoe gives a similar example involving a CEO of a certain company being asked to make fraudulent payments to hackers. Lin et al. and Kelley and Kathuria give steps that could be used to identify and prevent spear-phishing campaigns, which is also part of the course materials.

From the knowledge gained from this task, I think that the problem of spear phishing is likely to continue affecting millions of Internet users and causing huge losses to companies. The outcome of elections in different countries around the world could be subject to spear-phishing campaigns. Given the psychological aspect associated with this technique, it may be difficult to educate and create public awareness for Internet users to avoid being scammed. In the future, I believe spear phishing is going to make Internet usage a dangerous affair, especially when communicating sensitive information. However, I also believe that spear-phishing techniques are not foolproof and with careful and deliberate efforts to ensure safe Internet usage, the involved stakeholders could come up with ways of addressing this problem.

Conclusion

I have learned that spear phishing is a pervasive cybercrime technique that hackers use to steal personal information, especially user names and passwords, from unsuspecting Internet users. The interesting thing about this trick is that Internet users willingly, albeit unknowingly, divulge their personal information to cybercriminals. It is clear that the implications of spear phishing are enormous and far-reaching for the affected individuals, companies, and governments. Nevertheless, despite the widespread susceptibility of Internet users to spear-phishing scams, stakeholders could create ways of mitigating this problem for safe Internet usage.

Works Cited

Gendre, Adrien. “The Corporate Impact of Phishing.” Vade Secure. 2015. Web.

Kelley, Diana, and Seema Kathuria. “Microsoft. 2019. Web.

Lin, Tian, et al. “Susceptibility to Spear-Phishing E-mails: Effects of Internet User Demographics and E-mail Content.” ACM Transactions on Computer-Human Interaction (TOCHI), vol. 26, no. 32, 2019, pp. 1-28.

Martin, Nicole. “Forbes. 2019. Web.

Swinhoe, Dan. “What is Spear Phishing? Why Targeted E-mail Attacks are so Difficult to Stop.CSO. 2019. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, February 12). The Concept behind Spear Phishing. https://ivypanda.com/essays/the-concept-behind-spear-phishing/

Work Cited

"The Concept behind Spear Phishing." IvyPanda, 12 Feb. 2022, ivypanda.com/essays/the-concept-behind-spear-phishing/.

References

IvyPanda. (2022) 'The Concept behind Spear Phishing'. 12 February.

References

IvyPanda. 2022. "The Concept behind Spear Phishing." February 12, 2022. https://ivypanda.com/essays/the-concept-behind-spear-phishing/.

1. IvyPanda. "The Concept behind Spear Phishing." February 12, 2022. https://ivypanda.com/essays/the-concept-behind-spear-phishing/.


Bibliography


IvyPanda. "The Concept behind Spear Phishing." February 12, 2022. https://ivypanda.com/essays/the-concept-behind-spear-phishing/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1