In 2016, an employee at Austrian aerospace firm FACC wired $47 million to a bank account controlled by criminals — because an email that looked like it came from the CEO told them to. The CEO was fired. The CFO was fired. The company's stock tanked. That single email was a whaling attack, and it's one of the most devastating threats your organization faces in 2022. Whaling attack cybersecurity isn't about defending average employees from mass phishing blasts. It's about protecting the people at the very top — the ones with the authority to move millions with a single approval.

This post breaks down exactly how whaling attacks work, why they're surging, real incidents that cost organizations tens of millions, and the specific steps you can take to stop them. If you have executives, board members, or senior leaders with authority over finances or sensitive data, this is the guide you need right now.

What Is a Whaling Attack in Cybersecurity?

A whaling attack is a highly targeted form of phishing that goes after senior executives — CEOs, CFOs, board members, and other high-value individuals within an organization. The term "whaling" comes from the idea that threat actors are hunting the biggest fish in the sea rather than casting a wide net.

Unlike standard phishing campaigns that blast thousands of generic emails, a whaling attack involves extensive reconnaissance. The attacker researches the target's role, communication style, business relationships, recent press coverage, and even social media activity. The result is a convincing, personalized message that's extremely hard to distinguish from a legitimate request.

These attacks typically arrive as emails, but they can also come through phone calls, text messages, or even physical mail. The goal is almost always the same: trick a powerful person into authorizing a wire transfer, sharing credentials, or exposing confidential data.

Why Whaling Attacks Are Surging in 2022

The FBI's Internet Crime Complaint Center (IC3) reported that Business Email Compromise (BEC) — the broader category that includes whaling — caused adjusted losses of $2.4 billion in 2021 alone. That makes it the single most financially damaging category of cybercrime reported to the FBI. Not ransomware. Not credential theft. BEC.

Several factors are fueling the surge. Remote work has eroded the informal verification channels executives used to rely on — walking over to someone's desk and asking, "Did you actually send this?" The explosion of publicly available data on LinkedIn, SEC filings, and press releases gives attackers a detailed playbook for crafting convincing messages. And the rise of deepfake audio technology means a phone call "confirming" a fraudulent wire transfer can sound exactly like the CEO's voice.

I've seen organizations with mature security programs — ones that run regular phishing simulations and have solid technical controls — still get hit by whaling attacks. The reason is simple: their executive protection strategy was an afterthought.

Anatomy of a Whaling Attack: Step by Step

1. Target Selection and Reconnaissance

The threat actor identifies a high-value target. They scrape LinkedIn for the org chart, read earnings call transcripts, monitor the target's Twitter feed, and review SEC filings for M&A activity. They're looking for context — a deal closing, a new vendor relationship, a board meeting — that makes their pretext believable.

2. Infrastructure Setup

The attacker registers a lookalike domain. If your company is acmecorp.com, they might register acme-corp.com or acmecorp.co. They configure email authentication to make messages appear legitimate. Some attackers go further and compromise a real email account belonging to a trusted third party — a law firm, an accountant, a vendor.

3. The Lure

The email arrives. It references a real deal the company is working on. It uses the CEO's actual communication style — maybe short and direct, maybe formal. It often creates urgency: "We need to wire $380,000 to close this acquisition today. I'm in meetings and can't call. Handle this directly and keep it confidential." The confidentiality request is key — it discourages the target from verifying through normal channels.

4. The Hook

The victim, under time pressure and trusting the apparent sender, initiates the wire transfer or shares the requested credentials. Once funds are sent, they're typically moved through multiple accounts across jurisdictions within hours. Recovery rates are abysmal.

5. Exfiltration and Disappearance

The attacker vanishes. The lookalike domain goes dark. The money is gone. The organization discovers the fraud hours or days later, usually when someone finally talks to the real executive.

Real Whaling Attacks That Cost Millions

Ubiquiti Networks: $46.7 Million Gone

In 2015, Ubiquiti Networks disclosed that employee impersonation and fraudulent requests targeting its finance department resulted in $46.7 million in transfers to overseas accounts. The company recovered about $15 million. The attack used spoofed executive emails to authorize the transfers — a textbook whaling operation.

Crelan Bank: $75.8 Million

Belgian bank Crelan lost approximately $75.8 million to a BEC whaling attack in 2016. The fraud was discovered during an internal audit. Attackers impersonated senior management and directed wire transfers to accounts they controlled.

Mattel: A Near Miss

In 2016, a finance executive at Mattel received a request from what appeared to be the new CEO to wire $3 million to a Chinese bank. She complied. It was only because the transfer occurred on a Chinese banking holiday that the company had time to intervene and recover the funds. One banking holiday saved Mattel $3 million.

These aren't sophisticated zero-day exploits. They're social engineering at its most refined — and most effective.

The $4.88M Lesson: Why Technical Controls Alone Fail

According to the 2021 Verizon Data Breach Investigations Report, 85% of breaches involved a human element. Whaling attacks exploit human trust, authority bias, and urgency — none of which your email gateway can fully detect.

I've reviewed whaling emails that passed every technical filter. They came from legitimate-looking domains. They contained no malware, no malicious links, no attachments. Just text. A request. An instruction from the boss. Your spam filter doesn't flag "Please wire $250,000 to this account for the Henderson acquisition."

This is why whaling attack cybersecurity demands a layered approach that combines technical controls with rigorous training and process changes. Technology is necessary but wildly insufficient on its own.

How to Defend Your Organization Against Whaling Attacks

Implement Executive-Specific Security Awareness Training

Your C-suite needs targeted training, not the same generic module you give every new hire. Executives face different attack vectors, different pretexts, and different social engineering tactics than rank-and-file employees. Enroll your leadership in cybersecurity awareness training designed for real-world threats that covers whaling, BEC, and executive impersonation scenarios.

Run Whaling-Specific Phishing Simulations

Generic phishing simulations test whether employees click on fake shipping notifications. Whaling simulations test whether your CFO will wire $500,000 based on a spoofed email from the CEO. These are fundamentally different exercises. Use phishing awareness training for organizations to build targeted simulations that mimic real whaling tactics — urgency, authority, confidentiality requests, and lookalike domains.

Establish Out-of-Band Verification for Financial Transactions

This is the single most effective process control you can implement. Any wire transfer, ACH payment, or change in vendor banking details above a defined threshold must be verified through a separate communication channel — a phone call to a known number, a face-to-face confirmation, or a secure messaging platform. Never verify using the same email thread that made the request.

Deploy DMARC, DKIM, and SPF

Email authentication protocols won't stop every whaling email, but they make it significantly harder for attackers to spoof your exact domain. CISA provides clear guidance on implementing email authentication. If you haven't enforced DMARC at the reject policy level, do it now.

Adopt a Zero Trust Mindset

Zero trust isn't just a network architecture philosophy — it's a decision-making framework. No request should be trusted based solely on who appears to have sent it. Every sensitive action requires verification. Train your executives and finance team to treat every unusual request as potentially fraudulent, regardless of the sender.

Enable Multi-Factor Authentication Everywhere

If a whaling attack targets credentials instead of wire transfers, multi-factor authentication (MFA) is your last line of defense. A compromised executive email account becomes a launchpad for internal attacks against the entire organization. MFA on all executive accounts — email, VPN, cloud services, financial systems — is non-negotiable.

Limit Publicly Available Executive Information

Every detail your CEO shares on LinkedIn, Twitter, or in press interviews is potential reconnaissance material. I'm not saying executives should go dark on social media. But they should understand that posting about a specific deal, a board meeting in London, or a new banking relationship gives attackers the context they need to craft a convincing lure.

How Is a Whaling Attack Different from Spear Phishing?

All whaling attacks are spear phishing attacks, but not all spear phishing attacks are whaling. Spear phishing targets any specific individual — a developer, an HR coordinator, an IT admin. Whaling specifically targets senior executives and high-authority individuals. The distinction matters because whaling attacks typically involve higher stakes, more sophisticated pretexts, and greater potential damage. A compromised developer might leak source code. A compromised CEO might authorize a $50 million wire transfer.

Build a Whaling-Resistant Culture

The organizations I've seen successfully defend against whaling attacks share three traits. First, their executives take security training personally — they don't delegate it or skip it. Second, they've built verification processes into financial workflows that can't be bypassed by anyone, including the CEO. Third, they've created a culture where questioning an unusual request from a senior leader is rewarded, not punished.

That cultural shift is the hardest part. When a junior finance associate gets an email from the CEO saying "Wire this now and don't discuss it with anyone," the natural instinct is to comply. Training must override that instinct. Your people need to know — really know, in their bones — that verifying a suspicious request will never get them in trouble, but failing to verify one might cost the company millions.

Your Executives Are the Biggest Target — Act Like It

Whaling attack cybersecurity isn't a niche concern. It's the frontline of modern corporate defense. The FBI's IC3 data makes it clear: BEC and whaling attacks are the most financially devastating cybercrime category in existence. Your adversaries are investing serious time and effort into researching your leadership. The question is whether you're investing the same level of effort into protecting them.

Start with executive-specific training. Build verification processes that no email can circumvent. Deploy email authentication. Run realistic whaling simulations. And above all, create a culture where healthy skepticism is valued more than blind obedience.

Your executives didn't get to the top by being careless. But whaling attacks exploit the very qualities that make them effective leaders — decisiveness, urgency, and trust. The best defense is making sure those qualities are balanced with the right training and the right processes.