How Spearphishing Emails Trick Smart People

Spearphishing is a targeted scam. You get an email that looks like it’s from someone you know—a manager, a supplier, a client. It asks you to do something simple: click a link, approve a payment, download a file. But the message is fake. And one click can cause real damage.

This kind of attack doesn’t depend on software flaws. It depends on people. That’s why it works so often.

What Happens in a Spearphishing Attack

Attackers start with research. They look up your business online, scan your company’s website, check social media, and collect names and roles. They copy email signatures. They look for patterns in how and when invoices are sent.

Then they write the message. It might be short and sharp: “Can you send payment today?” or “Here’s the updated supplier form.” It might use your boss’s name. It might reference a real supplier.

Timing matters. Most are sent at the end of the day, before a weekend, or during busy periods—when mistakes are more likely. They often include pressure or a sense of urgency.

When someone replies, clicks, or pays, it’s too late. The damage is done.

Why Smart People Fall for It

These emails don’t feel like scams. They feel like part of a normal day. That’s what makes them dangerous.

They use trust—like a manager’s name or a known supplier’s style. They rely on habit—you see an invoice, you pay it. They add pressure—there’s a deadline, someone’s waiting, you’re the blocker.

It’s not about being gullible. It’s about being busy.

Most businesses rely on Microsoft Outlook, but spearphishing affects every platform. Gmail, Yahoo, and other inboxes are just as likely to be hit. Microsoft’s own data shows email-based identity threats are constant, and growing.

These emails often bypass filters. They don’t include viruses or obvious spam. They look real. That’s why human habits are the first line of defence.

In Belgium, Crelan Bank lost €70 million after staff believed fake emails from senior leadership. In Japan, Toyota Boshoku transferred $37 million to criminals pretending to be a trusted business partner.

These weren’t technical failures. They were people trying to do their jobs quickly.

This isn’t about installing new tools. The basics make a big difference.

Talk to your team. Show them how real these messages look. Add a second check for payments—like calling the person who requested it. Use multi-factor login where you can. And ask staff to report anything suspicious, even if it seems small.

Spearphishing Spotter: Team Checklist

Print this. Share it. Keep it visible.

Spearphishing Red Flags

  • The message is urgent—approve, transfer, or reply fast

  • The sender looks familiar, but something’s slightly off

  • The tone or wording doesn’t sound right

  • There’s a link or attachment you didn’t expect

  • The email address doesn’t match the usual one

If you’re unsure, stop. Don’t click. Don’t reply. Report it.

Spearphishing is designed to fool people who are trying to work quickly and helpfully. You don’t need better tech to deal with it. You need a team that knows what to look for—and knows when to pause.

We help small businesses in Wiltshire make sense of this stuff without jargon. If you want a second opinion on how your emails are protected, we’ll talk you through it, no strings.

Further reading: Multifactor authentication

18th June 2025

Why MFA Prompts Are the New Hacker Trick (and What to Do About It)

MFA fatigue attacks trick business users into approving fake login prompts. We want to tell you how the attacks work, why they’re effective, and what SMEs can do to reduce the risk of MFA fatigue being used as a point of vulnerability.

Learn more
29th May 2025

What are great businesses learning from the M&S cyber attack?

Not just a cyber attack, an M&S cyber attack. What forward-thinking businesses can learn from the recent high-profile hacking attacks.

Learn more
7th May 2025

How Spearphishing Emails Trick Smart People

Spearphishing scams don’t just fool careless people—they target the top players at busy businesses. Whilst you can never anticipate every personalised email, you can learn how they work and how you and your team can spot them.

Learn more