Modern teams are more vulnerable than ever to phishing scams because remote workers and cross-functional teams rely heavily on software to collaborate. Emails and Microsoft Teams messages have replaced in-person meetings and quick cubicle visits. A convincing enough email can slip in unnoticed among the dozens of memos, requests, and approvals the average worker handles every day.
The rise of micro-targeting and identity abuse
Attackers craft convincing email messages focused on specific targets with the aim of tricking them into clicking a link or sharing credentials. By scraping data from LinkedIn and other social media sites, they find personal information and develop language models based on this data.
Messages may look like a manager emailing their direct reports or a user sending an IT request. Often, attacks target more junior employees because they have less cybersecurity training and would feel pressure to respond to a superior. The entire process can be automated, but for high-value targets (whaling attacks), an attacker might be hands-on-keyboard behind the scenes.
Sketchy behavioral signals are just as important
Spear phishing attacks exploit trust. They don’t have obvious tells like suspicious URLs or broken grammar. Instead, they appear to be from legitimate, trusted colleagues. To spot them, end users should be on the lookout for strange behavior, like making unusual requests or sending messages at odd hours.