• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • NoSpamProxy 25Reports
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
    • AS4
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
    • Blog
    • Newsletter Subscription
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Whaling-Angriffe erklärt: So zielen Cyberkriminelle auf Führungskräfte

Whaling attacks explained: How cybercriminals target executives

Author: Stefan FeistTechnical Writerhttps://www.linkedin.com/in/stefan-feist-23b257b0/–Connect on LinkedIn

Whaling is a form of phishing that targets the “big fish” in a company, i.e., CEOs and other executives who have power, money, information, and influence. In our blog article, you can find out what whaling is, how it works, and how you can protect yourself and your company from whaling.

20.10.2025|Last edited:27.10.2025

Who doesn’t know the story of Captain Ahab hunting the white whale Moby Dick? Herman Melville’s novel is about a large and rare creature that becomes an obsession. While Ahab (spoiler alert!) perishes because of this obsession, cybercriminals in the real world are unfortunately often successful.

Whaling is a form of phishing that targets the “big fish” in a company, i.e., CEOs and other executives who have power, money, information, and influence.

Whaling is therefore not an attack on the masses, but a highly precise attack that uses psychological tricks, customized emails, and manipulative scenarios. If the attack is successful, the damage to the company can be enormous – both financially and in terms of reputation.

What is whaling?

Simply put, whaling phishing is nothing more than phishing for particularly important or valuable targets. To be a little more precise, whaling is like spear phishing, which is aimed exclusively at executives. As with spear phishing, the attacks are highly personalized and carefully prepared.

The attackers try to match the writing style of the real sender. They mention current business discussions or other information in their messages to give the impression of authenticity. The targets are therefore thoroughly vetted in advance so that customized, credible emails and documents can be created to serve as bait. This is where the OSINT principle (see below) comes into play, i.e., reading publicly available sources.

However, the criminals also spy on the interactions between the sender and the target by hijacking the sender’s real email account. This allows them to send messages directly from there. As with other forms of phishing, the criminals’ goal is to defraud victims of their money, steal sensitive data, or gain access to networks—in order to commit even greater fraud later on.

Phishing, whaling, CXO fraud – what are the differences?

As already mentioned, whaling is a sub-form of phishing. Whaling attacks also feature many of the typical characteristics of phishing emails. When we talk about “conventional” phishing, it targets the general public, as in the case of phishing with fake invoices or phishing with fake car brochures.

Spear phishing, on the other hand, targets individuals, and in some cases entire departments or teams. The approach is significantly different: the degree of personalization is high, and social engineering is essential to make the fake emails appear credible.

Even more problematic is that spear phishing is now scalable – thanks to artificial intelligence. Accordingly, there are also large-scale spear phishing campaigns that appear authentic and personalized despite the mass of emails sent.

CXO fraud is closely related to executive fraud, CEO fraud, fake president fraud (FPF), and business email compromise (BEC). All of these terms describe the use of false identities as the basis for a scam; in CXO fraud (also known as CEO fraud), attackers pose as superiors or other decision-makers within a company. They persuade employees to transfer money to their account. In some cases, they impersonate their own supervisor, in others a customer or supplier, for example to send supposed invoices in their name.

    Whaling is often successful

    While criminals involved in CXO fraud pose as big fish in order to deceive employees below C-level, whaling attacks target the big fish – and are very often successful, as the following two examples show:

    Ubiquity Networks suffered a loss of nearly $47 million in 2015. Attackers convinced the chief accounting officer to make a series of transfers to finance a secret acquisition.

    A senior executive at Mattel fell for a fake email that purported to be from the CEO. The executive initiated a transfer of over $3 million, only part of which could be recovered.

    What techniques are used in whaling?

    Whale phishing uses a mixture of classic social engineering, technical tricks, and targeted research. Here are a few examples of commonly used techniques:

    • Gathering information according to the OSINT principle

      OSINT stands for Open Source Intelligence and describes the collection of information from freely available sources, such as LinkedIn, Instagram, or Facebook profiles.

    • Spear Phishing

      Every day, countless people around the world fall victim to phishing attacks. Criminals use cleverly designed and embellished scenarios to convince people to click on a link or open an attached document. The term spear phishing describes the attempt to use targeted attacks to persuade victims to perform certain actions or disclose information.

    • Spoofing

      Spoofing is a tactic that can be used in phishing and other cyberattacks. Email spoofing involves falsifying the sender’s address to make it appear as if the message comes from a trusted source. To do this, the sender’s address is manipulated so that the email appears to come from a well-known company, government agency, or person known to the recipient.

    • Pretexting

      Pretexting is a form of social engineering. Trust is built by telling a story that is as convincing as possible—even before the attack. Criminals pretend, for example, that they are working on an important project—a realistic situation for a CEO.

    • Dringlichkeit und Geheimhaltung

      For attacks to be successful, the victim must feel that they need to act quickly—and preferably without further scrutiny from others who might notice inconsistencies. Overall, the characteristics are similar to those of other forms of phishing.

    • Deepfakes und Vishing (Voice Phishing)

      Artificial intelligence offers attackers previously unimagined possibilities: with the help of artificially generated voices and videos, victims are even tricked via video chats or phone calls.

    How can I protect myself against whaling?

    A key aspect of protecting against whaling phishing attacks is a thorough evaluation of the sender’s reputation. Companies should therefore consistently use the SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting & Conformance) procedures. DKIM and DMARC make it possible to ensure the authenticity and integrity of emails.

    A correctly configured DMARC policy (“reject”) prevents fake emails from being delivered. DMARC records are also an effective means of preventing emails from being sent on behalf of your domain by unauthorized senders. Tools such as 25Reports are an indispensable aid in setting up and maintaining your DMARC records. 25Reports takes care of all DMARC monitoring for you – automated, graphically presented, and GDPR-compliant.

    In addition, we recommend using modern email security gateways with features such as content filtering, sandboxing, and URL checking. This blocks suspicious emails before they reach the inbox.

    In NoSpamProxy, URL Safeguard works together with the metadata service 32Guards to prevent access to links that have been identified as malicious after delivery. This allows links in emails to be rechecked every time they are clicked.

    The content filter in NoSpamProxy protects through content disarm and reconstruction: attachments in PDF, Word, and Excel formats are converted into non-critical PDF files automatically based on rules. In addition, active content (JavaScript, Flash) is removed from PDF files. This ensures that the recipient receives an attachment free of malware or ransomware.

    Not yet using NoSpamProxy?

    With NoSpamProxy Protection and 25Reports, you can reliably protect your company from dangerous whaling emails and benefit from many other security features. Request your free trial now!

    Get your free NoSpamProxy trial now!
    • share 
    • share 
    • share 
    • email 

    SEARCH

    PRODUCT

    • All Topics
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NospamProxy Large Files

    You need support?

    You can find more information about NoSpamProxy in our documentation and forum.

    CATEGORY

    • All Topics
    • News
    • Product
    • Tech & Support
    • Events

    NoSpamProxy Newsletter

    Subscribe to Newsletter
    RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

    NoSpamProxy

    • NoSpamProxy Cloud
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • Price request
    • Team
    • Career
    • General terms and conditions
    • Data Protection Information for Business Partners and Applicants
    • Cybersecurity (PSIRT)

    Partners

    • Becoming a reseller
    • Partners
    • Order Certificates
    • Newsletter

    Categories

    • All topics
    • News
    • Support
    • Updates
    • Order certificates

    Latest News

    • Flow Guard in NoSpamProxy: Ihr Schutz gegen E-Mail-Missbrauch 800x800
      Flow Guard in NoSpamProxy: Your protection against email abuse07.11.2025 - 14:07
    • Intelligentes Greylisting mit NoSpamProxy 800x800
      Intelligent greylisting with NoSpamProxy30.10.2025 - 13:35
    • Info Icon
      End of TLS Client Authentication Certificates24.10.2025 - 10:11
    IMPRINT • EULA • Privacy Policy • • © 2025 Net at Work GmbH
    • Link to Rss this site
    • Link to LinkedIn
    • Link to Youtube
    • Link to X
    • Link to Instagram
    Link to: NoSpamProxy offers automated certificate management for DFN and HARICA Link to: NoSpamProxy offers automated certificate management for DFN and HARICA NoSpamProxy offers automated certificate management for DFN and HARICA Link to: End of TLS Client Authentication Certificates Link to: End of TLS Client Authentication Certificates Info IconEnd of TLS Client Authentication Certificates
    Scroll to top Scroll to top Scroll to top