What is spear phishing?
Spear phishing is a form of targeted phishing where the attacker personalizes their message for a specific person or group within a company. Unlike traditional phishing, which is sent out en masse with a generic message, spear phishing relies on information collected about the target: name, position, current projects, hierarchy, communication habits. The result is a highly credible email that is often undetectable by traditional spam filters.
According to the Verizon DBIR 2025, phishing remains the third most common initial access vector (16% of breaches), but its average cost is among the highest: $4.8 million per incident according to IBM (Cost of a Data Breach Report 2025). The IBM 2025 report also reveals that 16% of breaches now involve attackers using AI, mainly for phishing (37% of cases) and deepfake identity theft (35%).
Sources: Verizon DBIR 2025 — IBM Cost of a Data Breach Report 2025
How does a spear phishing attack work?
Phase 1: Recognition
The attacker collects information via LinkedIn, the company's website, social media, and sometimes previous data leaks. They identify decision-makers, reporting lines, and ongoing projects. The Verizon DBIR 2025 notes that third-party involvement in breaches has doubled in one year (30% of breaches), providing attackers with even more data to personalize their messages.
Phase 2: Social engineering
The email is written to imitate a trusted sender: a supervisor (CEO fraud), a supplier, or a partner. The message creates a sense of urgency or legitimacy and encourages the recipient to open an attachment, click on a link, or transfer funds. In 2025, generative AI makes these messages grammatically perfect and contextualized, eliminating the classic clues (spelling mistakes, awkward phrasing).
Phase 3: Operation
If the target clicks, several scenarios are triggered: execution of a malicious macro in an Office document, downloading of malware via PowerShell, redirection to a fake login page to steal credentials. The Verizon DBIR 2025 indicates that 88% of attacks against web applications involve stolen credentials. This is where workstation hardening makes a difference: a hardened workstation blocks the majority of these exploitation vectors.
Source: Verizon DBIR 2025
Find our solutions for protecting workstations and mobile devices
Why hardening is your best technical defense against spear phishing
User awareness is necessary but insufficient. According to the Verizon DBIR 2025, the average click-through rate on phishing simulations remains around 1.5% (median), and the report states that "the failure rate is not affected by training." In other words, even the best-trained employees end up clicking. The question is not IF someone will click, but WHEN.
This is why technical protection of the workstation is essential. Hardening blocks the exploitation chain after the click: Office macros from the Internet are blocked, PowerShell is in Constrained Language Mode, ASR (Attack Surface Reduction) rules prevent untrusted files from running, and the Print Spooler is disabled on workstations that do not print. Even if the user clicks, malware cannot run on a hardened workstation.
Source: Verizon DBIR 2025
If you would like to learn more, check out the complete guide to Windows hardening.
5 steps to protect your business from spear phishing
1. Hardening workstations
Block unsigned macros, restrict PowerShell, enable ASR rules, disable unnecessary services. This is the most effective measure because it neutralizes exploitation even when human prevention fails. Ransomware, often triggered by a spear phishing email, now appears in 44% of breaches according to the Verizon DBIR 2025, up from 32% the previous year.
Source: Verizon DBIR 2025
2. Deploy an EDR (Endpoint Detection and Response)
EDR detects suspicious post-click behavior and can automatically isolate a compromised workstation. The IBM 2025 report shows that organizations using AI and automation in their security operations saved an average of $1.9 million per incident and reduced the breach lifecycle by 80 days.
Source: IBM Cost of a Data Breach Report 2025
3. Filter emails upstream
Advanced filtering solutions (Microsoft Defender for Office 365, Proofpoint, Vade Secure) analyze links and attachments in real time and detect identity theft attempts (DMARC, DKIM, SPF).
4. Raise awareness and test regularly
Quarterly phishing simulation campaigns measure team resilience. While click rates are impossible to reduce, reporting rates can be improved: the Verizon DBIR 2025 notes that organizations investing in regular training see a reporting rate four times higher. Every email reported is a free security alert.
Discover our expertise in auditing, pentesting, and corporate phishing campaigns.
5. Implement multi-factor authentication (MFA)
Even if credentials are stolen via a phishing page, MFA prevents attackers from accessing accounts. Microsoft reports that MFA blocks more than 99% of password attacks. However, beware of MFA bypass techniques (prompt bombing, token theft) that are gaining ground: the 2025 DBIR notes that 14% of incidents involve prompt bombing.
Sources: Microsoft Digital Defense Report 2024 — Verizon DBIR 2025
![Spear phishing: detecting and protecting your business [2026 Guide]](https://cdn.prod.website-files.com/63d3877314a22f50a62a2aac/6993380ff70e8f6653c7c02c_spear%20phishing.jpg)


