Spear Phishing
Your public profile is their attack playbook.
What You'll Learn in Spear Phishing
- Identify how attackers use open-source intelligence (OSINT) to craft personalized phishing emails
- Analyze email headers and sender domains for signs of spoofing or impersonation
- Apply independent verification procedures to validate unknown contacts
- Recognize the difference between mass phishing and targeted spear phishing techniques
- Evaluate your own social media presence for information that could fuel an attack
Spear Phishing Training Steps
-
A Productive Morning
Welcome to Prismwave Technologies! You are Alice, a Senior Product Analyst at this fast-growing fintech startup. Last week, Alice gave her first major conference presentation at TechForward Summit 2026. She spoke about real-time threat intelligence for fintech and the talk was a hit. She posted about it on LinkedOut and the engagement has been incredible.
-
Checking the Buzz
Alice is curious how her LinkedOut post about the conference is performing. She opens her browser to check the engagement.
-
The Post That Started It All
The post has gathered impressive engagement - over 200 reactions and dozens of comments from industry peers. Alice feels proud of the professional visibility.
-
A Flattering Email
A new email arrives from Kevin Park, Solutions Director at Nexelion Partners. He says he attended Alice's talk at TechForward Summit and wants to discuss a partnership opportunity.
-
The Personal Touch
The email is impressively specific. Kevin references Alice's talk title, mentions Marcus by name, and even knows about Project Sentinel. He claims to have spoken with Marcus at the networking mixer. Alice is flattered. A Solutions Director from a partner firm saw her talk and wants to collaborate. She decides to check out the shared materials.
-
The Collaboration Portal
The link opens what appears to be Nexelion Partners' document sharing portal. To access the shared files, Alice needs to sign in with her work email.
-
Something Went Wrong
Instead of the shared documents, the portal displays an error message claiming the session has expired. Alice dismisses it as a temporary glitch and returns to her other work.
-
Knowledge Check
Before continuing, let's reflect on what just happened.
-
Security Alert
Three days have passed. Alice receives an urgent email from the Prismwave Security Operations Center. Her account has been compromised.
-
Investigation Portal
Alice needs to review the investigation report to understand the full scope of the breach.