Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Angriffsmethoden Glossary

Whaling

Highly specialized spear-phishing attacks targeting top executives (CEO, CFO, CISO). Attackers spend weeks researching their targets to create perfectly forged emails—often in the context of M&A, financial transactions, or confidential projects.

Whaling is the most dangerous form of spear-phishing. The name is derived from "big fish"—instead of targeting many ordinary employees (phishing), whaling targets the "big fish": CEOs, CFOs, CISOs, board members, and other C-suite executives.

Why CEOs Are Particularly Vulnerable

Executives are attractive targets for several reasons:

  • Decision-making authority: CEOs can authorize payments directly
  • High-value access: Access to M&A data and strategic plans
  • Time pressure: Executives are busy—little time for follow-up questions
  • Status authority: Emails from CEOs are rarely questioned
  • Abundance of OSINT: LinkedIn, interviews, conference appearances = extensive research base

Anatomy of a whaling attack

Phase 1: OSINT reconnaissance (weeks to months)

Attackers intensively gather information:

  • LinkedIn profile: career, connections, activities
  • Company website: executive team, organizational chart, press releases
  • Annual reports and investor relations: financial data, strategy
  • News articles: interviews, quotes, current projects
  • Conference talks: agenda, presentations, speaker bios
  • Xing, Twitter/X: personal interests, travel activities

Phase 2: Constructing an attack scenario

Credible contexts for whaling:

M&A scenario: > "I am the attorney handling the acquisition of [real company]. The NDA phase requires a strictly confidential payment of €2.3 million. Please transfer the funds by Friday at 5:00 PM—the legal team has been instructed."

Tax/Regulatory Authority Scenario: > Email purportedly from an auditor or tax authority: "Tax audit in progress—confidential payment required by Monday."

Board Member Request: > Spoofed or lookalike email from a known board member: "Confidential acquisition project—CFO, please do not inform anyone else."

Phase 3: Spear-Phishing Email

The whaling email is handcrafted:

  • Real names of colleagues, lawyers, banks
  • Correct email signature replicated
  • Reference to real current projects (from OSINT)
  • Urgency + confidentiality ("Don’t talk to anyone about this")
  • Plausible sender domain (spoofing or look-alike: arnwelt-consulting.com instead of arnwelt.com)

Notable Whaling Cases

FACC AG (2016): Austrian aerospace group lost €50 million due to a fake CEO directive sent to the CFO. The CFO was fired.

Crelan Bank (2016): Belgian bank lost €70 million due to a whaling attack targeting the CEO.

Ubiquiti Networks (2015): $46.7 million stolen via compromised email communication between the CEO and CFO.

Levitas Capital (2020): Australian hedge fund lost nearly everything following a whaling attack—the fund was liquidated.

Whaling vs. Regular Phishing

FeatureMass PhishingSpear PhishingWhaling
Target audienceEveryoneSpecific departmentC-suite
EffortMinimalDaysWeeks/months
Customization0%ModerateHigh
Success rate0.1–3%15–30%50%+
Potential damage€100s€10,000s€1 million

Protective Measures

Technical

  • DMARC p=reject: prevents email spoofing of your own domain
  • Email banner for external emails ([EXTERN] tag in the subject line)
  • Lookalike domain monitoring (register/monitor variants of your own domain)
  • Separate email address for the executive board (not listed in legal notice)
  • Dual-control principle for wire transfers > threshold amount

Process

  • Callback procedure: Confirm financial instructions by phone (known number!)
  • No email-only for wire transfers > X € – second channel always required
  • Travel communication: Advance notice when CEO/CFO is traveling – higher risk of attack
  • "No exceptions": Even CEO instructions follow the approval process

Awareness

  • C-suite receives dedicated whaling training (not generic phishing training)
  • Simulated whaling attacks on the executive board (with a warning message if "successful")
  • Limit public LinkedIn posts (less OSINT attack surface)
  • Be aware of "social engineering" in travel situations—in hotels, at conferences

Whaling is not a technical problem—it is an organizational one. The best firewall is useless if the CFO approves an email that appears to be from the CEO.