Spear Phishing
Spear phishing is an e-mail spoofing fraud attempt that targets a specific organisation, seeking unauthorised access to confidential data.
Experience the new ICICI Bank website now!
Now faster, fresher and smarter for a better banking experience.
Internet banking
Offers especially for you!
ICICI Bank Personal Loans
For your safe, comfortable, and convenient travel needs
Campus Power - from a dream to a degree, with you at every step.
Solutions for student, parents and institutes.
Just getting returns on your investment?
Save Tax too, while you build your corpus!
ICICI Bank PPF Account
A blessing for wealth creation is here for you!
All it takes is 5 minutes!
Instant payout on selling shares, with the ICICIdirect Prime Account.
Want us to help you with anything?
Request a Call back
Spear phishing is an e-mail spoofing fraud attempt that targets a specific organisation, seeking unauthorised access to confidential data.
Spear phishing is a targeted phishing attempt through an e-mail that appears to come not only from a trusted source, but often from someone in your own company, a superior in many cases, or from a close relative. The subject line address is customised/personalised and often will be one of relevance to either current projects of developments within the company, or may be related to family event. The violation occurs when the user opens the e-mails, clicks on the link attached and then trojans or malware gets downloaded or a form appears on the screen, in which data needs to be filled in by the recipient. This information is confidential and could be useful for accessing and transacting on internal organisation's application.
Spear phishing has success in manipulating users confidential information for 3 reasons:
An example of spear phishing would be an e-mail that appears to come from a specified and known network or IT person within your company. It prompts you to login with your employee name and password. Upon doing so, a malware is downloaded. As once the perpetrator has the user name and password of that employee, he/she can then access great amounts of company data using that access or perform transactions.