Please fill in the form below to subscribe to our blog

Spear Phishing Growth is a Whale of a Problem

June 19, 2020
spear phishing growth represented by a computer with spear phishing typed on the screen

Spear Phishing Growth Adds Danger to an Already Treacherous Phishing Landscape

Phishing is today’s top cybersecurity menace, and it’s only becoming a bigger threat in the post-pandemic landscape. Especially since remote workers are more likely to fall for phishing scams. Specialized phishing attacks like spear phishing and whaling are having a particularly big impact – spear fishing growth is up over 600% since the start of the COVID-19 pandemic.

As though general phishing isn’t enough of a cybersecurity problem, spear phishing is especially insidious. Using information about the victim gathered from the Dark Web and other sources, smart cybercriminals craft phishing emails that appear to be legitimate and closely related to the victim’s business or personal interests, to trick the recipient into interacting with them and giving the bad actor a way into the victim’s systems and data – and they’re highly effective.  

It’s not just the rank and file who have to worry about watching out for phishing attacks. Whaling attacks are designed to catch even bigger prey – executives, administrators, and other privileged users with access to the most sensitive data. These big fish are often less likely to suspect that they’re being targeted by phishing, and not as trained to look out for threats, with disastrous results.  

Quickly and effectively protect your company without breaking the bank by using these two tools 

Download our eBook “One Phish, Two Phish” to get the facts on phishing and actionable intelligence about steps that companies can take immediately to defend against phishing attacks. 


Phishing Training for Everyone is Mission Critical 


Every cybersecurity strategy includes phishing training but doesn’t necessarily make it a priority – and that’s a mistake. Especially with strong spear phishing growth expected to continue in today’s drastically increased threat environment, the strongest defense any company can build against phishing is a well-trained staff. What’s more, frequent and updated phishing training shouldn’t just be a priority for some of your users – it needs to be a top priority for everyone who accesses your network, from the interns to the CISO.  

BullPhish ID is the perfect choice for phishing training and testing at every level. Our dynamic kits help you undertake phishing training that can connect with every user and deploys quickly, even to your remote staff. BullPhish ID includes over 80 phishing kits and 50 security video campaigns, including content 8 languages. It’s updated regularly with training to resist new threats, including COVID-19 phishing scams (which are on track to be the biggest phishing vector in history. 


Monitor the Dark Web for the Right Information to Reduce Threats 


Dark Web monitoring gives companies a general picture of their threats and helps guard against dangers like malicious insiders and password compromise.  But the right Dark Web monitoring can not only guard against general threats, it looks out for specific information that may make your executive team more likely targets for whaling attacks. 

Dark Web ID is definitely the right solution. Not only is the human and machine intelligence used by Dark Web ID to detect threats at work looking for general threats 24/7/365, Dark Web ID will also be on the lookout for specific email credentials to hit the Dark Web to warn you when a highly privileged user is in danger of compromise.  

Is your information for sale on the Dark Web? Our experts take you into the markets where those transactions happen in the webinar “Unveiling Cybercrime in Dark Web Markets” plus get a free deck of Dark Web screenshots! WATCH IT NOW>>


Two Simple Fixes Solve One Big Problem 


By adding Dark Web ID and  BullPhish ID to your security stack, you’re putting important building blocks in place to create a strong digital risk protection platform. We know that every company has different needs, and we’re ready to help you build your perfect cybersecurity defense. See our solutions in action in these 10-minute technical demonstration videos.  

Contact ID Agent today for an expert analysis of how our cybersecurity solutions fit your needs and your bottom line.