SPEAR-PHISHING
The highly-targeted and well-researched form of phishing
WHAT IS SPEAR-PHISHING?
Spear-Phishing attacks are emails that appear to come from a known or trusted source in order to dupe targeted individuals to reveal confidential information. It differs from phishing emails which are more generic and sent to thousands of recipients.
91% of cyberattacks start with a phishing email
91% of all cyber attacks begin with a phishing email to an unexpected victim
Over 200K Unique Phish Sites
In 2021, 214,345 unique phishing websites were identified, with recent phishing attacks doubling since early 2020
60%+ of companies
go out of business
More than 60% of businesses close permanently within 6 months of a cyber-attack.
WHAT DOES SPEAR-PHISHING LOOK LIKE?
Spear-phishing emails typically impersonate a well-known brand or trusted source and contain a link to a faked login page. The combination of familiar branding and requiring urgent action can be enough to trick even well-trained employees to click through and submit their passwords.
Brand Impersonation
With the display name “Microsoft Team” and the domain name “emailsupport.co” the attacker is attempting to masquerade as Microsoft support.
Specifically Targeted
This email is specifically targeted Jim Halpert, as he is in the accounts payable department Paperco, with the aim of gaining access to their mailbox.
Faked Login Page
The email contains a link to an expertly spoofed Office 365 login page, which is virtually indistinguishable from the genuine Office 365 login page.
HOW DOES MESH PROTECT AGAINST
SPEAR-PHISHING?
Mesh applies over 250 unique filters to every single email it processes, protecting against the full spectrum of email attacks. Combining machine learning, predictive threat intelligence and advanced content analysis, Mesh identifies indicators of compromise, fraud, impersonation, phishing, malicious content, spam, and unsolicited marketing emails, keeping organizations and their people safe.
URL Protect
All links in the email are subjected to scanning against real-time threat feeds for known and unknown malicious sites as well as fake login pages and phishing sites. Links to unknown or suspicious objects are sandboxed
Attachment Sandboxing
Unknown and potentially malicious attachments are detonated in a virtual environment to determine their behavior, protecting against never-before-seen, zero-hour threats like polymorphic malware.
Antimalware Engines
Mesh uses a combination of commercial and proprietary engines to perform signature and heuristic-based scanning in order to detect known and unknown, types of malware such as viruses, ransomware and trojans.
Its ability to detect emails specifically targeting high-risk individuals is incredibly reassuring
Mesh has significantly reduced the amount of email-related tickets we receive. The ability to manage everything centrally from partner level makes our job so much easier - we can make changes for all clients in one go. Onboarding was quick and painless, both our engineers and end-users took to it straight away.”
Jason Gilmer
Network Admin at Reading Bakery Systems
Ready to get started?
Make your customers safer and
your MSP more efficient.
MSP Success Stories
Discover how your MSP peers have made their MSPs more efficient and profitable, while delivering better email security to their customers.
Mesh is not for everyone
We’re developing the only email security platform built exclusively for MSPs, but nobody is perfect and Mesh is not for every team.