Learning Library

← Back to Library

Phishing, Spear Phishing, and Whaling Explained

Key Points

  • Phishing attacks exploit social engineering by creating urgent, emotionally charged messages that prompt victims to click links or open files, leading to credential theft or malware infection.
  • The primary goal is to lure users onto counterfeit websites or execute malicious files, enabling attackers to steal accounts, corporate secrets, or personal financial information.
  • Phishing variants include generic bulk attacks, targeted spear‑phishing that tailors content to a specific individual or organization, and “whaling,” a high‑level spear‑phishing aimed at executives.
  • The more personalized and context‑relevant a phishing message (e.g., mimicking a known bank or a boss), the higher the likelihood of a successful compromise.
  • Understanding these tactics and recognizing the underlying social‑engineering cues are essential steps in defending against phishing threats.

Full Transcript

# Phishing, Spear Phishing, and Whaling Explained **Source:** [https://www.youtube.com/watch?v=gWGhUdHItto](https://www.youtube.com/watch?v=gWGhUdHItto) **Duration:** 00:07:50 ## Summary - Phishing attacks exploit social engineering by creating urgent, emotionally charged messages that prompt victims to click links or open files, leading to credential theft or malware infection. - The primary goal is to lure users onto counterfeit websites or execute malicious files, enabling attackers to steal accounts, corporate secrets, or personal financial information. - Phishing variants include generic bulk attacks, targeted spear‑phishing that tailors content to a specific individual or organization, and “whaling,” a high‑level spear‑phishing aimed at executives. - The more personalized and context‑relevant a phishing message (e.g., mimicking a known bank or a boss), the higher the likelihood of a successful compromise. - Understanding these tactics and recognizing the underlying social‑engineering cues are essential steps in defending against phishing threats. ## Sections - [00:00:00](https://www.youtube.com/watch?v=gWGhUdHItto&t=0s) **Phishing Tactics and Defenses** - The passage explains how various phishing scams exploit greed and fear through urgent social‑engineering prompts that compel victims to click malicious links, surrender credentials, or install malware, and outlines the need to recognize and guard against these tactics. ## Full Transcript
0:00you've been selected congratulations 0:02you're a winner you've got free money 0:05waiting for you your account has been 0:07deactivated 0:09click here to confirm your account 0:11you've got a package waiting for you 0:13all of these things are different forms 0:16of phishing attacks some of them are 0:18about greed and some of them are tapping 0:21into fear but they're all trying to 0:24social engineer you they're trying to 0:26get you to take an action through some 0:28sort of immediate motivation 0:32so we're going to talk about fishing and 0:34what's behind it and how you can defend 0:36against it so one of the first things 0:38we'll talk about was so is the social 0:40engineering aspect of it social 0:42engineering what does that mean well it 0:46means that we're trying to get you to do 0:48something it's a con game I tell you to 0:51do something I give you a time 0:53motivation or something like that the 0:55clock is ticking in order for you to 0:58take an action quickly and what am I 1:00trying to get you to do as a result of 1:01this social engineering well I'm going 1:03to try to get you to click on a link 1:05that takes you to some fake website if I 1:09can get you there then I can get you to 1:11type in your credentials and then I can 1:13steal your account or I can steal 1:16corporate Secrets or I could get enough 1:18information about you in order to open 1:20up a credit card in your name 1:22another type of attack that I might be 1:24trying to get you to do would be to 1:27infect your system 1:29if you click on this link or you click 1:32on this file and open it it installs 1:34malware on your system then I'm able to 1:37see your credentials or I can take over 1:39your system but these are sort of the 1:41object of what the phishing attack is 1:43trying to get now how about the 1:45different types of phishing attacks well 1:47in fact we've got phishing attacks that 1:50are General in nature so they're sort of 1:53the general phishing attack which is 1:56pretty indiscriminate I'm just going to 1:58send out if I'm in a Fisher I'm going to 2:00send this out to anybody and see who 2:03responds 2:04then there's a more specific type of 2:07phishing attack that we call spear 2:09fishing 2:10and in a spear phishing attack a 2:13specially crafted message that would 2:15make sense to you in fact the more 2:18specific it is to you and your 2:19environment the more likely you are to 2:22click on it it doesn't have the same 2:23widespread appeal but sometimes it's 2:25more effective so for instance if I know 2:28that you bank at a particular place I'll 2:30send you the phishing email as if it 2:32came from that particular Bank 2:34now if you send a spear phishing attack 2:36and it doesn't apply to certain of your 2:39audience then they don't fall for it if 2:41I know I don't have a bank account at 2:42that place I'm not going to click 2:44presumably but this can be very 2:47effective another form of this would be 2:49uh that it comes from your employer and 2:52they know who you work for they could 2:54even spoof who it's coming from and say 2:58that it's coming from your boss and 3:00therefore you're likely to click on it 3:02so this is an example of spear phishing 3:05um another variation on this is called 3:08whaling 3:09this is a special case of spear fishing 3:12where I'm going after the big fish I'm 3:15going for the c-suite I'm sending this 3:17to the CEO the CFO the CEO somebody 3:21really important with lots of 3:22information and lots of access so I'm 3:25going to put in lots of detail it's 3:27going to be very specially crafted in 3:29order to make sure that it's effective 3:31there are other options here as well 3:33that Fishers use SEO poisoning 3:38foreign is another example where I put 3:41up a fake website and then I do enough 3:44to trick the search engine into 3:46believing that my site is real and that 3:48this should be listed higher on the 3:51search results and then people going and 3:53doing a search so this is not driven by 3:55an email they go and do a search on a 3:57regular search engine and they see this 3:59in the top three and they click on it 4:01when they're trying to get to their bank 4:02and they end up getting to my fake site 4:05and then another form of this is called 4:08smushing 4:10smishing is basically the SM part being 4:14SMS so it's a phishing attack whereas 4:17most of these these first two the 4:19actually the first three are coming in 4:21email this is coming of course into a 4:24search engine and this is coming through 4:25an SMS message but it's all intended to 4:29do the same sorts of things that we've 4:30seen over here 4:32now what should you do to protect 4:34against this well there's a number of 4:35things you could do the most important 4:37thing you could do in all of this is 4:40stop and think 4:42think about if it's too good to be true 4:45if it sounds that way it probably is you 4:48probably didn't win free money your 4:51account may have been deactivated but 4:53there's probably a better way to find 4:54out than just clicking on that link 4:56what are some other things don't click 5:00the Instinct because we see something 5:02immediate is to respond and click on 5:04that if the the old Rule and you may 5:07have heard this is don't click on a link 5:09if you don't know where it came from I'm 5:11going to suggest to you you never know 5:13where it came from or at least in most 5:15cases you don't because sending email 5:18addresses can be spoofed I could send an 5:21email that looks like it came from your 5:22bank and you might not be able to tell 5:24the difference I could send it as if it 5:26came from your boss and you might not be 5:28able to tell the difference so don't 5:31rely on who you think it came from rely 5:34on is this something that you feel you 5:37should open or not are you expecting 5:39this file are you expecting this link 5:41that's a much better rule I think to 5:43follow 5:43other things you can do make sure your 5:46systems are patched 5:48that is keep the software levels up to 5:50date in a lot of cases Fishers will rely 5:52on vulnerabilities in the operating 5:54system or applications in order to 5:56infect your system 5:57you can also do the traditional things 5:59like antivirus or the newer stuff like 6:02endpoint detection and response in order 6:04to protect your endpoint your client 6:07system from these 6:09some other things you can do is use an 6:12email security program something that 6:14basically scrubs all the emails that 6:17come into you 6:18and looks for links to known fishing 6:22sites and other types of of dangerous 6:24places 6:25and then another thing you could 6:27consider is using a secure DNS 6:32a DNS is the domain name server that's 6:34what turns a 6:37www.website.com into a numerical address 6:40that's actually needed to send it over 6:42the internet 6:43so if you use a secure DNS it may have a 6:47list already of known phishing sites 6:50known malware sites known hacker sites 6:53and if you click on that link when it 6:55goes off to get a resolution to turn 6:57that name into a number into an IP 6:59address it will simply deny and will not 7:03return that to you because it knows that 7:04that's a dangerous place to go in the 7:07first place IBM in fact offers one of 7:09these it's free if you're interested in 7:11it called quad nine and it's just 7:14basically go into your browser or to 7:16your DNS settings on your system and 7:19change the DNS to 9.9.9 7:22and it will provide that kind of 7:24protection for you for free there are 7:25other similar Services as well if you'd 7:27like to take a look at those the bottom 7:29line is phishing is a huge attack a lot 7:32of people are falling for it and you see 7:34this happening all the time you see so 7:36many phishing emails coming in because 7:38in fact people are falling for it don't 7:40be a victim 7:42thanks for watching please remember to 7:43like this video And subscribe to this 7:45channel so we can continue to bring you 7:47content that matters to you