{"id":3546,"date":"2025-03-26T07:39:39","date_gmt":"2025-03-26T06:39:39","guid":{"rendered":"https:\/\/enthec.com\/?p=3546"},"modified":"2025-03-26T07:39:39","modified_gmt":"2025-03-26T06:39:39","slug":"whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/","title":{"rendered":"Whaling: the attack that targets senior executives and keys to avoid it"},"content":{"rendered":"<p><span data-contrast=\"none\">Although we don&#8217;t always consider it, cybercriminals often look for the most influential people within a company: senior executives. Why? Because they have access to critical information, handle large amounts of money, and, in many cases,   <\/span><b><span data-contrast=\"none\">are not as prepared in terms of digital security as they should be.<\/span><\/b><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":240,\"335559739\":240}\"> <\/span><\/p>\n<p><span data-contrast=\"none\">This is where<\/span> <b><span data-contrast=\"none\">whaling<\/span><\/b> comes into play,<span data-contrast=\"none\">a type of attack aimed at a company&#8217;s senior executives, who can approve millionaire transfers or know sensitive data without too many obstacles. And, although it may not seem like it, these attacks are more common than we think. <\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":240,\"335559739\":240}\"> <\/span><\/p>\n<p><span data-contrast=\"none\">To combat this threat, solutions such as<\/span> <a href=\"https:\/\/enthec.com\/en\/qondar\/\"><span data-contrast=\"none\">Qondar<\/span><\/a> <span data-contrast=\"none\">by Enthec help detect and prevent impersonation attempts and fraud targeting senior executives, strengthening the company&#8217;s security against attacks such as whaling.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":240,\"335559739\":240}\"> <\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">What is whaling and how does it work?<\/span><\/b><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"134245418\":true,\"134245529\":true,\"335551550\":0,\"335551620\":0,\"335559738\":320,\"335559739\":80}\"> <\/span><\/h2>\n<p><span data-contrast=\"none\">The term whaling comes from the word<\/span> <i><span data-contrast=\"none\">whale<\/span><\/i>. <span data-contrast=\"none\">This attack targets influential company personalities, <\/span><b><span data-contrast=\"none\">such as managers, CEOs, CFOs, and others with access to strategic information.<\/span><\/b><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":240,\"335559739\":240}\"> <\/span><\/p>\n<p><span data-contrast=\"none\">It consists of an advanced form of <\/span><a href=\"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/\"><span data-contrast=\"none\">phishing<\/span><\/a> <span data-contrast=\"none\">where <\/span><b><span data-contrast=\"none\">attackers impersonate someone and trust to trick the victim into performing a harmful action, <\/span><\/b><span data-contrast=\"none\">such as approving a transfer or sharing login credentials.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":240,\"335559739\":240}\"> <\/span><\/p>\n<p><span data-contrast=\"none\">Criminals often employ several strategies:<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":240,\"335559739\":240}\"> <\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Inter\" data-listid=\"1\" data-list-defn-props=\"{\"335551671\":1,\"335552541\":0,\"335559683\":0,\"335559684\":-1,\"335559685\":720,\"335559991\":360,\"469769242\":[65533,0,46],\"469777803\":\"left\",\"469777804\":\"%1.\",\"469777815\":\"hybridMultilevel\"}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Spoofed emails.<\/span><\/b><span data-contrast=\"none\">They develop spoofing techniques to make an email appear from the CEO, a trusted partner, or even an official body. <\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":220,\"335559739\":220}\"> <\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Inter\" data-listid=\"1\" data-list-defn-props=\"{\"335551671\":1,\"335552541\":0,\"335559683\":0,\"335559684\":-1,\"335559685\":720,\"335559991\":360,\"469769242\":[65533,0,46],\"469777803\":\"left\",\"469777804\":\"%1.\",\"469777815\":\"hybridMultilevel\"}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Attacks man in the middle.<\/span><\/b><span data-contrast=\"none\">They intercept communications between managers or employees to modify messages and obtain valuable information. <\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":220,\"335559739\":220}\"> <\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Inter\" data-listid=\"1\" data-list-defn-props=\"{\"335551671\":1,\"335552541\":0,\"335559683\":0,\"335559684\":-1,\"335559685\":720,\"335559991\":360,\"469769242\":[65533,0,46],\"469777803\":\"left\",\"469777804\":\"%1.\",\"469777815\":\"hybridMultilevel\"}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Social engineering.<\/span><\/b><span data-contrast=\"none\">They collect information from the victim on social networks or leaked databases to make their attacks more credible. <\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":220,\"335559739\":220}\"> <\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\">Unlike common phishing, which sends mass emails hoping that someone will fall for it,<\/span> <b><span data-contrast=\"none\">whaling is a personalized and well-crafted attack<\/span><\/b><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":240,\"335559739\":240}\"> <\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">A real case of whaling<\/span><\/b><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"134245418\":true,\"134245529\":true,\"335551550\":0,\"335551620\":0,\"335559738\":320,\"335559739\":0}\"> <\/span><\/h3>\n<p><span data-contrast=\"none\">Imagine you&#8217;re the CFO of a company. You receive an email from the CEO asking you to urgently approve a transfer of \u20ac250,000 to an account in another country to close an important deal. The message is well written, with the signature and tone that the CEO usually uses. He even has an answer above that seems authentic.   <\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":240,\"335559739\":240}\"> <\/span><\/p>\n<p><span data-contrast=\"none\">You will have fallen into the trap if you have no doubts and make the transfer without checking it with a call or a second channel. Days later, you will discover that the CEO never sent that message and that the money has been lost in a network of accounts that are impossible to trace. <\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"335551550\":0,\"335551620\":0,\"335559738\":240,\"335559739\":240}\"> <\/span><\/p>\n<p><span data-contrast=\"none\">This is not science fiction: companies of all sizes have lost millions to these attacks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-3538 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-phishing.jpg\" alt=\"whaling phishing\" width=\"600\" height=\"400\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-phishing.jpg 600w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-phishing-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-phishing-350x233.jpg 350w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The relationship between whaling and the man-in-the-middle attack<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">One of the most sophisticated methods cybercriminals use in whaling is the<\/span> <a href=\"https:\/\/enthec.com\/en\/the-impact-of-man-in-the-middle-attacks-on-companies\/\">Man in the Middle (MITM) attack<span style=\"font-weight: 400;\">.<\/span><\/a> <\/p>\n<p><span style=\"font-weight: 400;\">In this attack, hackers<\/span> <b>communicate between two parties<\/b> <span style=\"font-weight: 400;\">(e.g., between a manager and an employee) and manipulate messages without victims noticing.<\/span><\/p>\n<h3><b>How does a man-in-the-middle attack work in cybersecurity?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The attacker can:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Intercept emails and<\/b> <span style=\"font-weight: 400;\">modify content before they reach the recipient.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spying on network connections<\/b> <span style=\"font-weight: 400;\">on public or misconfigured Wi-Fi networks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spoofing websites <\/b><span style=\"font-weight: 400;\">to get the victim to enter their credentials on a page that looks legitimate.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For example, an executive may send an email with payment instructions, but if there is a man-in-the-middle attack, <\/span><b>the hacker can change the target bank account without anyone noticing.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In this case<\/span>, <b>whaling and the man-in-the-middle attack combine to make the scam even more difficult to detect.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Keys to avoid a whaling attack<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Fortunately, there are ways to<\/span> <b>protect yourself against these attacks.<\/b><span style=\"font-weight: 400;\">Here are some fundamental keys to avoid falling into fraud of this type: <\/span><\/p>\n<h3><b>1. Two-step verification always on<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If an email or message requests a transfer of money or sensitive information, <\/span><b>verify it through another channel.<\/b><span style=\"font-weight: 400;\">A simple call or message in another way can prevent financial disaster. <\/span><\/p>\n<h3><b>2. Avoid overexposure on social networks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The more personal information available about a manager, the easier for an attacker to forge a credible message. It is advisable <\/span><b> to limit public information on LinkedIn and other platforms.<\/b><\/p>\n<h3><b>3. Implement security filters in emails<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Whaling attacks usually come by email, so it is essential to have:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Advanced email filters<\/b> <span style=\"font-weight: 400;\">that detect phishing.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Email authentication (DMARC, SPF, and DKIM)<\/b> <span style=\"font-weight: 400;\">to prevent corporate email addresses from being forged.<\/span><\/li>\n<\/ul>\n<h3><b>4. Employ strict procedures for bank transfers<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Transfers should not be approved just by mail or message. Implementing  <\/span><b>double authorizations and strict protocols<\/b> <span style=\"font-weight: 400;\">can prevent millions in losses.<\/span><\/p>\n<h3><b>5. Keep systems and devices up to date<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Attacks exploit vulnerabilities in outdated software. <\/span><b>Always keeping your computers protected with security updates is critical.<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Whaling is a dangerous attack that can affect any company, from small startups to large corporations. Most worryingly, it doesn&#8217;t require  <\/span><a href=\"https:\/\/enthec.com\/en\/types-of-malware-and-keys-to-prevent-these-attacks-from-affecting-the-security-of-your-company\/\"><span style=\"font-weight: 400;\">sophisticated malware:<\/span><\/a><span style=\"font-weight: 400;\"> just<\/span> <a href=\"https:\/\/enthec.com\/en\/social-engineering-attacks-on-senior-executives\/\"><span style=\"font-weight: 400;\">social engineering<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><b>spoofing, and a good bit of deception.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If it is also combined with a man-in-the-middle attack, the risks increase since cybercriminals can modify messages without the victim noticing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The best cybersecurity defense against whaling attacks is prevention: establishing verification protocols and having advanced cybersecurity solutions in place. Tools such as Qondar make it possible to  <\/span><b>identify and de-identify exposed personal information, as well as fake social profiles, to prevent targeted attacks and protect senior executives from fraud and impersonation attempts.<\/b><span style=\"font-weight: 400;\"> Investing in security is not an option, but a necessity to avoid being the next victim.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Although we don&#8217;t always consider it, cybercriminals often look for the most influential people within a company: senior executives. Why? [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3541,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[23,25,33,52],"class_list":["post-3546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-qondar-en","tag-persons","tag-risks","tag-phishing-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 Whaling: How to Avoid These Attacks | Enthec<\/title>\n<meta name=\"description\" content=\"Find out what whaling is and learn how to protect yourself as a senior executive from this targeted cyberattack \u27a1\ufe0f Avoid fraud now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Whaling: How to Avoid These Attacks | Enthec\" \/>\n<meta property=\"og:description\" content=\"Find out what whaling is and learn how to protect yourself as a senior executive from this targeted cyberattack \u27a1\ufe0f Avoid fraud now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-26T06:39:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Whaling: the attack that targets senior executives and keys to avoid it\",\"datePublished\":\"2025-03-26T06:39:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/\"},\"wordCount\":880,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg\",\"keywords\":[\"Qondar\",\"Persons\",\"Risks\",\"phishing\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/\",\"url\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/\",\"name\":\"\u25b7 Whaling: How to Avoid These Attacks | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg\",\"datePublished\":\"2025-03-26T06:39:39+00:00\",\"description\":\"Find out what whaling is and learn how to protect yourself as a senior executive from this targeted cyberattack \u27a1\ufe0f Avoid fraud now!\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Composite image of hand using laptop put on a desk with letter icons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whaling: the attack that targets senior executives and keys to avoid it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Whaling: How to Avoid These Attacks | Enthec","description":"Find out what whaling is and learn how to protect yourself as a senior executive from this targeted cyberattack \u27a1\ufe0f Avoid fraud now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Whaling: How to Avoid These Attacks | Enthec","og_description":"Find out what whaling is and learn how to protect yourself as a senior executive from this targeted cyberattack \u27a1\ufe0f Avoid fraud now!","og_url":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-03-26T06:39:39+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Whaling: the attack that targets senior executives and keys to avoid it","datePublished":"2025-03-26T06:39:39+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/"},"wordCount":880,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg","keywords":["Qondar","Persons","Risks","phishing"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/","url":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/","name":"\u25b7 Whaling: How to Avoid These Attacks | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg","datePublished":"2025-03-26T06:39:39+00:00","description":"Find out what whaling is and learn how to protect yourself as a senior executive from this targeted cyberattack \u27a1\ufe0f Avoid fraud now!","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/03\/whaling-ataque-scaled.jpg","width":2560,"height":1707,"caption":"Composite image of hand using laptop put on a desk with letter icons"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Whaling: the attack that targets senior executives and keys to avoid it"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=3546"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3546\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/3541"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=3546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=3546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=3546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}