Whaling is a form of cyberattack in which the attackers impersonate high-ranking executives or other authority figures to obtain sensitive information or money from companies or individuals. Unlike phishing, which is broad-based and targets a large number of people, whaling focuses on specific high-level targets such as CEOs, CFOs, or other key individuals in organizations. The attackers often use personalized information to increase their credibility and trick victims into responding to fraudulent emails or other communication channels.
The term “whaling” is derived from the English word “whale”. The analogy is that whaling attacks are aimed at catching the “big fish” or the “whales” in the company – these are typically high-ranking executives such as CEOs, CFOs, or other key people.
A whaling attack typically has several steps:
The effectiveness of a whaling attack often depends on the persuasiveness of the spoofed communication and the credibility of the attacker posing as a trusted authority.
Companies can take various measures to protect themselves against whaling attacks:
By using a combination of training, technology, and clear security policies, organizations can strengthen their defenses against whaling attacks and reduce the risk of successful attacks.
Phishing is a broad form of cyberattack in which the attackers send masses of fake emails, text messages, or other means of communication to large numbers of people. These fake messages often pretend to come from legitimate companies, government agencies, or other trusted sources and ask recipients to disclose personal information, access fake websites, or download malicious attachments.
Spear phishing is a targeted form of phishing in which the attackers focus their attacks on a specific group of people or an organization. Unlike broad phishing, where the messages are often generic, spear phishing messages are often personalized and contain specific information about the targets to increase their credibility. For example, the attackers may use information from publicly available sources or social media profiles to carry out personalized attacks.
Whaling is a highly specialized form of spear phishing in which the attackers select high-level individuals such as CEOs, CFOs, or other executives as their targets. The fake messages in whaling attacks often pretend to come from other high-ranking executives or trusted sources within the company or organization and may specifically target sensitive information or financial transactions. Whaling attacks are designed to maximize payoffs and can therefore be particularly sophisticated and convincing.
In 2015, Ubiquiti Networks, a network infrastructure and Wi-Fi solutions company, was the victim of a whaling attack. The attackers posed as employees of the company and carried out a fraudulent transfer of more than 40 million USD. This incident resulted in a significant financial loss for the company.
In 2016, FACC, an Austrian manufacturer of aircraft parts, was the victim of a whaling attack. The attackers posed as the company’s CEO and asked the finance department to transfer more than 50 million euros to a fraudulent bank account. Although the employees initially carried out the transaction, the fraud was later discovered and most of the funds were recovered.
In 2019, the toy manufacturer Mattel was the victim of a whaling attack. The attackers posed as the company’s CEO and asked the finance department to transfer a considerable sum of money to a fraudulent bank account. Here too, the transaction was initially carried out, but after the fraud was discovered, the funds were recovered.