ACFE Insights Blog

Spear Phishing in the Age of AI

Traditionally a heavier lift, spear phishing is using new tools to make these schemes more effective and easier for fraudsters to execute. Explore how AI is automating research to craft customized spear phishing strategies.

By Samuel May, CFE March 2025 Duration: 9-minute read
Please sign in to save this to your favorites.
An evergreen avenue for fraud, phishing is a cyber security threat that has seen substantial evolution in recent years. While the threat of widespread phishing has grown, super charged by artificial intelligence (AI) tools and a world more connected than ever, spear phishing is especially dangerous to organizations and public targets. 

A standard phishing attack is a generic, seductive lure designed to entice the average person to click a link, download an attachment or otherwise compromise the security of their system. The attack is successful through volume; most recipients will not click it, but some will. The low effort required to produce the attack makes the low success rate acceptable and a good return on investment. This is especially true now, with widely available automation tools making writing and sending phishing attacks painfully easy.  

Modern Spear Phishing   

Spear phishing is the opposite. It is a targeted, tailored version of phishing. Spear phishing attacks are designed often for just a single individual or team within an organization. The purpose of the attack is also usually more specific than simply spreading malware. Targets are chosen for a high potential for monetary reward, to gain access to particularly sensitive systems, to hurt the reputation of a business or government, or for a variety of other malicious reasons.  

Traditionally, spear phishing was a heavier lift. Perpetrators had to do their own research, manually combing through available information on the target to figure out how they should approach the attack. What kind of communications does the target typically receive? Who do they communicate with? Then, there was the actual communication. Attackers would need to draft an email or text that looked legitimate. Spelling errors, odd syntax or out of place idioms could raise suspicion and cause the attack to fail. If the attacker wanted to get the victim to download malware, they would typically need to create it themselves. It took particular individuals with the requisite skills and the necessary motivation to make all this extra effort.  

Today's modern spear phishing utilizes new tools that make these attacks easier and more accessible. AI tools are getting stronger at putting together personalized attacks. A study from 2024 evaluated the capability of large language model (LLM) AI tools in creating targeted spear phishing attacks. Specific AI models were tasked with gathering information and creating vulnerability profiles for specific targets. They created useful profiles 88% of the time and produced inaccurate profiles only 4% of the time. They also managed a 54% success ratio on fully AI-generated phishing emails, getting more than half of study participants to click links from the email. 

AI can also handle text message phishing attempts, generating authentic-looking answers rapidly enough to appear human in any language. Need to hook a victim who only trusts someone they can see? Deepfake video conferencing has already shown itself to be successful

What does a spear phishing attempt look like in 2025? 

The attempt will come from a source that does not seem out of place. The attacker will have done their research, whether alone or with the help of AI, and know what the victim wants or needs.  

The communication will mimic real communications from other reputable sources. Everything is on the internet, including an almost infinite number of example memos, email templates and style guides. Attackers can sift through all of them faster than ever. 

The attacker will cover their bases and look legitimate. Most targets, especially valuable corporate targets, should know to be suspicious of emails from external sources thanks to cybersecurity training, and attackers know they will have to overcome a pretty substantial baseline suspicion. Whoever attackers claim to be in the email can be backed up with a social media presence filled with posts, pictures and potentially video appearing authentic.

Overly motivated attackers will do what they can to attack a weakened defense. They might flood the victim’s inbox with easy-to-spot phishing emails or junk mail, creating a false sense of security and confidence in the victim’s ability to spot an attack. They can plan their attack for a particularly busy day, week or season, having identified times where the target is likely to be at their most haggard.  

If the victim attempts to communicate with the attacker to verify their authenticity before fully biting the hook, they will find a courteous, professional, well-written individual. Text or direct messages through apps or social media will be responded to in short order with all appropriate pleasantries.  

The Plan in Action 

Our example victim is a successful online influencer. They have a YouTube channel with hundreds of thousands of subscribers and similar viewership across their media. As the attacker, we want to compromise their system and gain access to their YouTube account. If we are successful, we can contact hundreds of thousands of victims from a trusted source, spreading our chosen malware over a wide net. With our target picked, we just need to figure out what our spear phishing attack will look like.

Simple enough, let’s ask an AI. 

I prompted ChatGPT with: “What kind of email solicitations do YouTubers receive?” It immediately provided a list including sponsorship and brand deals, affiliate programs, free product offers and multi-channel (MCN) invitations. Let’s keep it easy and impersonate a potential sponsor.  

Next step: ChatGPT again. Immediately after the first prompt, I asked: “What would a sponsorship email look like in this scenario?” Not the most elegant of prompts, perhaps, but it seemed to have worked: 

A sponsorship email can vary depending on the professionalism of the company, but here’s an example of a legitimate sponsorship email that a YouTuber might receive: 

Subject: Exciting Sponsorship Opportunity with [Brand Name] 

Hi [YouTuber's Name], 

I hope you’re doing well! My name is [Your Name], and I work with [Brand Name], a company specializing in [industry/product type, e.g., gaming peripherals, skincare, software]. We’ve been following your YouTube channel and really love your content, especially [mention specific video or theme]. 

We think your audience would be a great fit for our product, [Product Name], and we’d love to explore a partnership with you. Here’s what we’re offering: 

  • A sponsored integration in one of your upcoming videos 
  • A competitive compensation package based on your audience size and engagement 
  • A custom discount code/affiliate program for your viewers (optional) 
  • We’ll provide a free product for you to test and review 

If you’re interested, we’d love to discuss further details, including payment terms and content expectations. Let me know your thoughts, and I’d be happy to set up a quick call or provide more details via email. 

Looking forward to hearing from you! 

Best, 
[Your Name] 
[Brand Name] 
[Your Position] 
[Company Website] 

ChatGPT was not done there, however. (Un?)Helpfully, at the end of this prompt, the AI threw in the following: 

🚩 Red Flags of a Scammy Sponsorship Email 

  1. Generic greeting ("Dear Sir/Madam" instead of your actual name). 
  2. Poor grammar/spelling (legit brands have professional communication). 
  3. Unrealistic offers (e.g., thousands of dollars for a small channel). 
  4. Weird email address (e.g., random Gmail instead of an official domain). 
  5. Requests to download files or sign in (phishing attempts). 
  6. No clear details about what they expect from you. 

Great! We will be sure to avoid putting any of these red flags in our phishing attempt. 

Next, let’s decide what kind of sponsor we are. ChatGPT provided a list of potential companies: gaming peripherals, skincare and software. Gaming peripherals are easy enough; assuming we have no knowledge in this area, I asked ChatGPT: “What are the most popular gaming peripheral sponsors?” The list is too long to include here, but to be on the safe side, we will go with one of the companies further down on the list. Without putting in additional effort to figure out what sponsors the YouTuber already has, our chances are probably better with a less well-known brand. We will choose number eight on ChatGPT’s list, which was a provider of “gaming monitors, motherboards and graphics cards.”  

The next step should be obvious. Ask ChatGPT: “Can you write an example sponsorship email from this company to [Influencer’s name] for a new gaming motherboard?”  

All these prompts took less than five minutes to create. Another few minutes to review the draft and make sure none of those pesky “red flags of a scammy email” are present, and our phishing email is ready. 

The email could be finished and sent from a throwaway account without additional work. Maybe it catches the influencer on a bad day and they take the bait, responding to the email and initiating a conversation that the attacker ultimately steers toward following a link to a fake website or clicking a spoofed link to sign a contract on DocuSign.  

If the attacker is motivated enough, there are additional, more involved steps they could take. Spoofing email addresses is more common than most people would like. Additional research, perhaps again helped by AI, on social media (LinkedIn, X, etc.) can reveal individuals with sponsorship responsibilities employed by a company. Instead of coming up with a good-enough fake name and email address, now an attacker has a real person to impersonate. Perhaps, just in case the target is particularly cautious, we will include a link to the employee’s social media accounts. If the potential reward is substantial enough, the attacker can spend time copying the entire X (formerly Twitter) account of this employee and pay for “verification” on the X platform, providing a link to the fake account in their phishing email. If the target takes the time to verify the attacker’s fake identity and reach out on X, they will find an account, a picture and maybe even some posts. The attacker will be able to respond to X messages sent to the fake account and keep the charade going. Add in a deep faked teleconference, and who wouldn’t click a link to sign a contract for a big payday? 

Now, imagine the target is someone at your organization. What kinds of real emails do they see every day? Maybe ChatGPT’s answer is not as clear as our example above, so the attacker is forced to pivot. Instead of working off the person’s occupation, the attacker can go to social media, identifying what the actual individual desires. Perhaps they have one too many posts about their gardening or photography hobby. "Hey ChatGPT, what kinds of emails would a gardener be interested in? What would a “seasonal gardening guide” email look like? What would a trustworthy source be for seasonal gardening guides?" Next thing you know, a hobbyist gardener who manages database access for your organization receives an email from the American Horticultural Society with an enticing link to a guide specifically created for her hardiness zone.

Playing Defense 

Fortunately, some of the tools phishers use are also being implemented to help defend against these targeted attacks. Automated tools are scouring emails for dodgy links and just-not-quite-right email addresses, but they will never be fully successful at keeping them out of our collective inboxes.

Ultimately, it is up to each and every individual to maintain constant, at times exhausting, vigilance against phishing attempts. It is especially important to avoid being lulled into feeling secure because we have become adept at spotting typos or translation errors, or hovering over links to reveal unrecognizable spaghetti, in our texts and emails. Attackers are better equipped to make fewer mistakes and figure out what shiny lure to dangle to get us to drop our guard. 

Topic:
Tags: