---
title: "Spear Phishing Examples | Phish Protection"
description: "Spear Phishing Examples: You can read about something, but it may not really click until you see real-world examples. You might know that it is a targeted."
image: "https://phishprotection.com/images/og-default.png"
canonical: "https://phishprotection.com/spear-phishing-examples/"
---

#  Spear Phishing Examples 

## **Spear Phishing Examples**

You can read about something, but it may not really click until you see real-world examples.

This can be especially true when it comes to spear phishing.

_You might know that it is a targeted [phishing attack](/content/phishing-prevention/phishing-attacks/) on either an individual or an organization_, but could you recognize one if you saw it?

In this article, we show you some **spear phishing examples** so you can familiarize yourself with the concept and know [how to identify a phishing email](/content/phishing-prevention/how-can-you-identify-a-phishing-email/). In these examples, you’ll see that even big names can fall victim to cybercriminals’ efforts.

![Tools Target Victims 1](https://media.mailhop.org/phishprotection/images/2019/01/tools-target-victims-1.png) 

### **Alcoa**

In what seems like an international spy movie scenario, the [Chinese military carried out phishing attacks](https://www.wsj.com/articles/alleged-chinese-hacking-alcoa-breach-relied-on-simple-phishing-scam-1400543823) on Alcoa, an American aluminum supplier. The cybercriminals masqueraded as a board member and sent out emails to several employees. When they opened the emails, malware was automatically installed onto their computers, which resulted in leaked trade secrets.

MORE : [What is a Phishing Email](/content/phishing-prevention/what-is-phishing/)?

### **Amazon**

Amazon is so popular on a worldwide level that most cybercriminals don’t have to go to much effort to trick their users; the majority of phishing attempts are generic.

But instances of spear phishing do happen on this platform. In 2015, a [clever spear phishing attack](https://threatpost.com/amazon-users-targets-of-massive-locky-spear-phishing-campaign/118323/)\_ fooled many customers into installing ransomware\_. The scammers sent out a dispatch email to users who had recently placed an order with Amazon, so the email appeared incredibly genuine to them.

MORE : [Prevent Spear Phishing](/content/phishing-prevention/spear-phishing-prevention/)

![Phishing Online Business](https://media.mailhop.org/phishprotection/images/2019/02/phishing-online-business.png) ![Domain Name Spoofing Protection Common 1](https://media.mailhop.org/phishprotection/images/2019/01/domain-name-spoofing-protection-common-1.png) 

### **PayPal**

When any website involves transactions and has millions of users, it’s sure to be a hot target for cybercriminals. Although most scam attempts are made through regular phishing, there’s been a few instances of [spear phishing attacks](/content/phishing-prevention/spear-phishing-attack/).

Instead of using blanket emails, _scammers send out more targeted ones that use customer names_. This strategy has a higher success rate since the emails look more legitimate.

### **RSA**

Even security companies aren’t invulnerable to spear phishing. In 2011, several employees were targeted with a [simple spear phishing attack](https://arstechnica.com/information-technology/2011/04/spearphishing-0-day-rsa-hack-not-extremely-sophisticated/). While the emails were sent to the junk folder, one worker managed to retrieve the email and click on the attachment, which then installed malware on their computer.

The malware turned out to be a remote access program, giving the cybercriminals access to sensitive company data via that single employee’s computer.

MORE : [Difference Between Phishing and Spear Phishing](/spear-phishing-vs-phishing/)

![Brand Forgery Components 1](https://media.mailhop.org/phishprotection/images/2019/01/brand-forgery-components-1.png) ![Business Email Compromise What Is It 1](https://media.mailhop.org/phishprotection/images/2019/01/business-email-compromise-what-is-it-1.png) 

### **Prevent security breaches**

As these **spear phishing examples** show the [spear phishing vs phishing](/content/phishing-prevention/spear-phishing-vs-phishing/) difference, scammers can infiltrate even the most sophisticated organizations. Chances are, your business has trade secrets you want to protect, just as these big brands do. Hence it is important to know [how to protect against phishing](/content/phishing-prevention/how-to-protect-against-phishing/) or use best [phishing prevention](/content/phishing-prevention/) software. If you want to avoid a similar fate to theirs, both you and your employees must follow [phishing prevention best practices](/content/phishing-prevention/phishing-prevention-best-practices/) and aware of current phishing scams.

### Enterprise-class email protection without the enterprise price

For flexible per-user pricing, PhishProtection’s integrated email security solution protects your employees from business email compromise (BEC) and many other email threats. 24×7\. On any device. With features you’d expect in more expensive solutions:

**All Plans Come With**

- Stops business email compromise (BEC)
- Stops brand forgery emails
- Stop threatening emails before they reach the inbox
- Continuous link checking
- Real-time website scanning
- Real time alerts to users and administrators
- Protection with settings you control
- Protection against zero day vulnerabilities
- Complete situational awareness from web-based console

### Join 7500+ Organizations that use Phish Protection

[ 60-Day Free Trial ](https://portal.duocircle.com/cart.php?a=add&pid=101&brand=phishprotection)

Phish Protection works with System Administrators, IT Professionals and IT Executives in thousands of companies worldwide. Sign up and protect your organization from phishing attacks in less than 5 minutes

![Sys Admin1](https://media.mailhop.org/phishprotection/images/2020/03/sys-admin1.jpg) ![Itprofessional1 E1585030432965](https://media.mailhop.org/phishprotection/images/2020/03/itprofessional1-e1585030432965.jpg) ![Directorofit1](https://media.mailhop.org/phishprotection/images/2020/03/directorofit1.jpg) 

## Protect your inbox from phishing attacks

Start your 60-day free trial - no credit card required.

[Start Free Trial](https://portal.duocircle.com/cart.php?a=add&pid=101&brand=phishprotection)

```json
{"@context":"https://schema.org","@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.facebook.com/duocirclellc","https://github.com/duocircle"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"21","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/phish-protection/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://phishprotection.com/contact/"},"knowsAbout":["Phishing Protection","Email Security","Anti-Phishing","Business Email Compromise","Ransomware Protection","Time of Click Protection","Office 365 Email Security","Advanced Threat Defense"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"Phish Protection","url":"https://phishprotection.com","description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","publisher":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
{"@context":"https://schema.org","@type":"Article","headline":"Spear Phishing Examples","description":"Spear Phishing Examples: You can read about something, but it may not really click until you see real-world examples. You might know that it is a targeted.","url":"https://phishprotection.com/spear-phishing-examples/","dateModified":"2023-08-01T10:59:26.000Z","author":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection"},"publisher":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://media.mailhop.org/phishprotection/images/phishprotection-logo.png"},"description":"Enterprise-grade email security that protects businesses from phishing, ransomware, and email fraud with real-time threat detection and multi-layered protection.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://phishprotection.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138897912","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc"],"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://phishprotection.com/contact/"},"knowsAbout":["Phishing Protection","Email Security","Anti-Phishing","Ransomware Protection","Business Email Compromise","Time of Click Protection","Advanced Threat Defense","Email Fraud Prevention","Phishing Awareness Training","Office 365 Email Security"]},"image":"https://media.mailhop.org/phishprotection/images/og-default.png"}
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://phishprotection.com/"},{"@type":"ListItem","position":2,"name":"Spear Phishing Examples","item":"https://phishprotection.com/spear-phishing-examples/"}]}
```
