Spear phishing is a targeted form of phishing aimed at a specific person, role, team, or organization.
Spear phishing is a targeted form of phishing aimed at a specific person, team, or organization. In plain language, it uses more context and personalization than broad phishing so the fraudulent message appears more believable to the intended victim.
Spear phishing matters because targeting increases the chance of success. A message that references a real project, internal process, executive name, or vendor relationship can be much more convincing than a generic phishing email.
It also matters because targeted credential theft or deception often leads to larger incidents. A compromise involving administrators, finance staff, executives, or support personnel may create more serious consequences than a random user-targeted campaign.
Spear phishing appears in executive-protection programs, identity defense, email monitoring, fraud prevention, and incident response. Teams defend against it through stronger identity protections, approval workflow design, awareness training, and careful investigation of unusual requests.
Security teams connect spear phishing to Business Email Compromise, Multi-Factor Authentication, Segregation of Duties, and Audit Log because targeted fraud often intersects with identity and approval process controls.
A finance manager receives a message that appears to come from a known executive and references an actual vendor payment process. The message is more persuasive than a generic phishing email because it uses role-specific context that matches the manager’s daily work.
Spear phishing is not a completely different category from Phishing. It is a more targeted and contextualized form of the same broader social-engineering tactic.
It is also different from Business Email Compromise, which is a specific fraud-focused pattern often aimed at payments, approvals, or business-process abuse.