eCommerce Fraud Knowledge Guide

Phishing

  1. Articles
  2. eCommerce Fraud
  3. Phishing
  4. Whaling
Phishing

Knowledge Guide Chapters

  1. What is Phishing?
  2. Common Phishing Tactics
  3. Smishing
  4. Phishing Emails
  5. Spear Phishing
  6. Whaling
  7. Vishing
  8. Angler Phishing
  9. Phishing: Statistics & Financial Impact
  10. Phishing Examples
  11. How to Identify Phishing Attacks
  12. Prevent Phishing Scams

WhalingEven CEOs Can Be the Target of Fraudsters

Shelley Palmer | December 12, 2025 | 11 min read
What is Whaling?

In a Nutshell

“Whaling attack.” It might sound like trouble for Captain Ahab, but it’s actually a surprisingly simple — and surprisingly effective — fraud attempt aimed at businesses. In today’s post, we break down what whaling is, how scammers build their attacks, and why even savvy execs can be fooled.

What Is a Whaling Attack, and How Can I Stop One?

Imagine this: you’re a billing manager at a Fortune 500 company. You’re sitting at your desk,  when you receive an email. It requests that you send $5,000 to cover an invoice for a company you’ve never heard of. You sigh: another fraud attempt.

You forward the message to IT, delete from your account, and get on with your day. But, what if instead, that email came from someone you knew? Say, from a respected board member?

You get an email from your CEO that says “I’m flying to Bangkok right now for an important meeting. I need access to the vendor’s account file, but I forgot the password. Can you shoot that to me?” Would you be so quick to dismiss it? Fraudsters are betting you wouldn’t.

This could be an example of “whaling,” a specific phishing tactic. Even one attack could be a huge headache for your organization. In this post, we explain how whaling works, why it’s so effective, and red flags you should watch for.

Phishing

Phishing involves a scammer attempting to deceive unsuspecting victims into voluntarily divulging sensitive information. An estimated 90% of cyberattacks begin with a phishing attempt. Here’s what you need to know about these attacks and how you can protect yourself.

What is Whaling?

Whaling

[noun]/wāl • iNG/

Whaling is a fraud tactic that involves a criminal impersonating a trusted source to exploit a top executive; one with access to funds or confidential data. The aim is to trick an executive into misusing company funds or giving up sensitive information.

“Whaling,” sometimes called whale phishing or CEO fraud, is a subset of phishing. It’s an increasingly common scam that targets senior executives — or “whales” — who can access private data like financial accounts, confidential information, or trade secrets. The fraudster requests funds or data by posing as someone the executive trusts. 

Whaling is similar to business email compromise (BEC) fraud, in that both involve theft through impersonation. What makes whaling unique is that the scam isn’t attempted on several persons at once. Rather, each attack is tailored to a specific person who can provide whatever the fraudster is phishing for. 

The other difference with whaling is that the crook typically poses as someone the target knows personally. In fact, scammers often spend extended periods becoming familiar with their victim and solidifying their deception. Only when that trust is established will the crook make their move.

Did You Know?

The term “whaling” also covers cases where the scammer targets a specific executive, but poses as an unknown representative of a familiar entity such as the IRS. Generally, though, whaling involves building a relationship with the victim by posing as an associate.

How do Whaling Attacks Work?

Whaling attacks unfold through a deliberate, methodical process that can span weeks (or even months). Understanding this timeline helps explain why these scams succeed even against experienced executives.

Reconnaissance

Stage #1 | Reconnaissance

The attack begins with reconnaissance. Fraudsters research their target extensively, mining LinkedIn profiles, company websites, press releases, and social media for useful details. They’re looking for personal information like recent promotions or family milestones, but also business intelligence: who reports to whom, upcoming projects, vendor relationships, and communication patterns.

Building Trust

Stage #2 | Building Trust

The attacker initiates contact using a spoofed email address or a compromised account belonging to someone the executive knows. Early messages are low-stakes and conversational, designed to establish rapport without raising suspicion. A scammer might reference a detail from the target's social media or congratulate them on a recent company announcement. The goal is simple: get the executive comfortable with the exchange.

Commence the Attack

Stage #3 | Commence the Attack

Once trust is established, the attacker strikes with an urgent request: wire a payment, share login credentials, or send sensitive employee data. The request always includes a compelling reason why normal verification procedures should be bypassed. For example,  an impending deadline, a confidential acquisition, or a system emergency. The victim believes they’re helping a trusted colleague solve a legitimate problem, so they’re likely to fall for it.

Did You Know?

Attackers increasingly leverage artificial intelligence to enhance credibility. AI tools can analyze writing styles and generate emails that perfectly mimic a colleague’s tone. Voice synthesis technology can clone an executive’s speech patterns from just a few seconds of audio, enabling convincing follow-up phone calls. Deepfake technology has even been used to impersonate executives on video conferences, adding a visual element that makes verification even more challenging.

Common Whaling Attack Vectors

TL;DR

Whaling attacks exploit multiple communication channels, including emails, voice, text messages, and even deepfake videos.

Attackers choose their approach based on the target's habits and vulnerabilities. Understanding these vectors helps organizations strengthen defenses where they're most exposed.

Email

Email remains the primary attack vector. Scammers use domain spoofing to create addresses that look nearly identical to legitimate ones; for instance, swapping one letter with a visually similar character, or registering domains one character off from the real thing. Alternatively, they may compromise a legitimate email account through credential theft, then use it to send messages from within the organization's own network.

Voice

Voice phishing, or vishing, has surged dramatically, with attacks increasing over 400% in recent years. Fraudsters call executives directly, often using caller ID spoofing to make it look like the call originates from a trusted number. With AI voice synthesis technology, attackers can now clone an executive's voice from publicly available audio, creating convincing impersonations for follow-up verification calls.

SMS or Messaging App

Text messages and collaboration platforms like Slack or Microsoft Teams provide additional entry points. These channels often receive less scrutiny than email, and their informal nature can make urgent requests seem legit. Attackers can also compromise LinkedIn accounts to initiate contact, leveraging the platform's professional context to build credibility

Video

Deepfake video conferences are a new, highly sophisticated vector. Attackers use AI to create realistic video avatars of senior executives that participate in live meetings, complete with accurate facial expressions and speech patterns. The 2024 Arup incident, where criminals used this technology to steal $25 million, demonstrates how effective this approach can be.

Did You Know?

Getting personal information to start seeding the whale isn’t all that difficult: sites like LinkedIn and Facebook are goldmines of information. Public data sources can be researched, as well. There’s likely even information on your company’s own “About Us” page that can be weaponized.

How Big of a Threat is Whaling? 2024-2025 Statistics

Whaling attacks are growing more common and can cause major financial damage. At the same time, they’re often overlooked compared to other cybercrimes.

Whaling has been called a “silent but explosive” threat. Silent, because it doesn’t get the same level of press as high-profile attacks like ransomware. Explosive, because whaling losses can potentially be far more damaging than other fraud attacks.

Not convinced yet? Check out these numbers:

65%

of large organizations that experienced a targeted phishing attack in 2024.

Source: HackingLoops

7

The average large organization received seven deceptive messages daily in 2024.

Source: HackingLoops

46%

of targeted executives that fell for a whaling scam in 2021.

Source: GreatHorn

82.6%

of phishing emails analyzed between September 2024 and February 2025 used AI in some form.

Source: KnowBe4

50%

Impersonation attacks increased by nearly 50% between Q1 2024 and Q1 2025.

Source: HackingLoops

$16.6B

Total cost of BEC attacks against organizations in 2024, many of which involved whaling.

Source: IC3

How Much Protection Is Enough?

Any type of fraud can be damaging. Chargebacks911 can help merchants develop customized fraud management strategies. Click here to request a demo.

Whaling Examples: Case Studies of High-Profile Whaling Attacks

For the victim, the damage caused by such attacks can be catastrophic. Below, I’ve outlined a couple of high-profile whaling examples that should help illustrate what’s at stake here:

Newspaper

Arup Engineering Firm Deepfake Attack

In one of the most sophisticated whaling attacks on record, cybercriminals targeted Arup, a multinational engineering firm, using deepfake video conference technology. I mentioned this briefly above, but it’s worth a deeper look.

A finance employee received what appeared to be a routine meeting invitation from the company’s CFO and other senior colleagues. During the video call, multiple executives — all AI-generated deepfakes — convinced the employee to authorize several wire transfers. The deepfakes were convincing enough to replicate facial expressions, speech patterns, and mannerisms with frightening accuracy. By the time the fraud was discovered, the company had lost $25 million.

This case marked a turning point in whaling attacks, demonstrating how artificial intelligence has elevated the threat beyond simple email spoofing to realistic, real-time impersonation that even trained employees struggle to detect.

Newspaper

FACC Aerospace Supplier Attack

Austrian aerospace parts manufacturer FACC fell victim to a whaling attack that cost the company approximately $47 million and resulted in significant leadership upheaval.

Cybercriminals impersonated the CEO in communications with the finance department, requesting funds for what was described as a confidential acquisition project. The request appeared legitimate: it came from the CEO’s email address, used appropriate business language, and referenced plausible company activities. The finance team, trusting the apparent source and the urgency conveyed, authorized the transfer to what turned out to be fraudulent accounts.

The financial loss was devastating, but the reputational damage proved equally severe. Both the CEO and CFO were terminated following the incident, highlighting how whaling attacks can permanently alter corporate leadership and damage stakeholder confidence.

Newspaper

Snapchat Employee Data Breach

Not all whaling attacks target money directly; some seek valuable data that can be exploited later. Snapchat’s payroll department received such an email that appeared to come from the company's CEO requesting employee payroll information.

The request seemed routine enough that the department complied without additional verification. The attacker successfully obtained sensitive data for numerous employees, including names, Social Security numbers, and wage information. While no direct financial theft occurred, the breach exposed employees to identity theft risks and created significant legal and compliance headaches for the company.

This incident demonstrates how whaling attacks can target HR and payroll departments, exploiting the fact that these teams regularly handle sensitive employee information and may be more accustomed to executive requests.

Newspaper

Ubiquiti Networks Wire Transfer Fraud

Networking technology company Ubiquiti Networks lost $46.7 million in a carefully orchestrated whaling attack involving fraudulent wire transfers.

Cybercriminals impersonated company executives in communications with the finance department over an extended period, building trust through seemingly legitimate correspondence. The attackers demonstrated detailed knowledge of company operations, vendors, and financial procedures. This made the requests for wire transfers appear authentic.

Once the fraud was discovered, Ubiquiti was required to report the incident to the SEC in quarterly filings, triggering stock price impacts and investor concern. The company eventually recovered some of the stolen funds through legal action and cooperation with law enforcement. But, the incident served as a wake-up call for the technology sector about the sophistication of executive impersonation attacks.

Important!

Generative AI has made attacks like these even easier for scammers, who may create deep fakes that mimic the voice and style of whoever is being impersonated.

You can’t afford to let down your guard.

Fraud prevention takes a plan. We can help with that.

Request a Demo
The Original End-to-End Chargeback Management Platform

Red Flags of a Potential Whaling Attack

The target of a whaling scam may be someone at the tip-top of the executive food chain. But, as companies flatten hierarchies, crooks may shift their attention to different (and newer) positions. That means all staff should be on the lookout for odd or unexpected messages, especially from someone they believe they’ve been associating with.

If you get an unusual text or email from anyone claiming to be connected to the company, look for these red flags before taking any action:

  • The message includes a request relating to a subject the two of you have never spoken of.
  • The subject is secretive, but for believable reasons (legal trouble, potential embarrassment, etc.).
  • The request is urgent, often requiring immediate action.
  • The request involves a large payout, wire transfers, changing bank details, or sensitive employee data.
  • Everything seems believable, but the request still feels off.
  • The request would require a deviation from your standard processes — such as skipping normal channels or intervening where you otherwise wouldn’t.

How to Identify Whaling Attempts

The lifecycle of a whaling attack is usually measured in weeks, or even months, depending on how long it takes for the crook to feel they’ve established sufficient trust. Then, they hit the victim with a request. 

The request will vary depending on the position of the executive. Below, I’ve outlined a few common requests targeted at individuals in key positions:

Target: CEO

Target: CEO

 “This is embarrassing, but our accounting department screwed-up and I’m worried we’re not going to make payroll. I hate to ask, but we just sent you an invoice for $10,000. Is there any way you could step in and have that wired to me – hopefully in the next 10 minutes?”

Target: COO

Target: COO

“I’ve been trying to get electronic copies of [sensitive documents that the real associate would actually need] for over an hour. Two of your people have tried to send them, with no luck. Could you please just try to send them to me yourself?”

Target: CFO 

Target: CFO

“It looks like someone has been trying to hack our systems. Just to be on the safe side, we’re changing some of our payment instructions. We now need all payments sent to [new account number]. Just in case, you’ll probably want to switch that as soon as possible!”

Target: CLO

Target: CLO

“Hey! Your [legal or regulatory papers] were due at midnight, and we haven’t received anything yet! I don’t know if they got lost en route, but I’m glad I noticed before the auditors did. If you email them to me right now, I’ll try to slip them in before anyone sees they’re missing.”

Specifics will vary. But, there are three key elements that will factor into every request:

  • The message and its sender must feel legitimate
  • There must be high-stakes involved
  • The need is urgent

Now, in most cases, a phone call or simple email could completely unravel the scam. That’s why the potential consequences must be high enough that the whale is persuaded to act swiftly, without following usual verification procedures.

How to Prevent (& Respond to) Whaling Attacks

TL;DR

Whaling can be prevented through vigilance and verification. Use technical email defenses, require strict internal approval processes, verify vendor changes, and strengthen staff awareness so everyone feels safe confirming unusual requests.

Can whaling attacks be prevented? It’s possible, in most cases.

Vigilance on the part of you and your top execs is the key to identifying attacks before they do damage. In addition to the red flags mentioned above, you’ll want to perform your own checks, like contacting alleged senders through a secondary, trusted channel before you act.

There are a few other precautions you can take to help safeguard your organization as a whole:

Tip

Employ Technical Defenses

Email authentication solutions help detect spoofed emails. These tools can cross-reference email content and metadata patterns (attachments, links, return-paths, etc.) against user behavior and suspicious sources.

Tip

Solidify Internal Verification

Require multi-party approvals for large fund transfers or sensitive data requests. Also, insist that everyone rigidly adhere to those protocols without exception (that means you, too).

Tip

Implement Strict Vendor-Verification Rules

Never change payment information or any other third-party vendor info without verifying with the vendor first. Any change to vendor payment info, for example, should trigger compliance checks and require confirmation from known contacts.

Tip

Build Awareness

We say this a lot, but it can’t be overstated: your best protection against fraud is regular education for staff. Develop a culture where employees feel safe to confirm unusual requests, even from senior execs.

Incident Response Plan: What Do You Do If Attacked?

TL;DR

Fraudsters will keep trying, so have a response plan ready. If an attack succeeds, immediately secure systems, notify security and compliance teams, contact banks if money is involved, consult legal teams for potential problems, and reset passwords.

Regardless of your prevention precautions, fraudsters will never stop trying to get to you. And the sad truth is: sometimes they’ll succeed. An important part of managing this kind of fraud is having a response plan, and that plan needs to be in place before you receive the first attack.

Immediate Response

Immediate Response

If fraudsters make it through your defenses, your first step is to seal off any potential access point. The whaler might have slipped a trojan horse or other virus into your previous communications, giving them access to other accounts of systems. Let IT do whatever it takes to control the situation.

At the same time, you’ll need to notify your security, compliance, or fraud-response teams. If money was sent or requested, contact the bank immediately; it may not be too late to freeze accounts or recover funds.

What to Do Next

What to Do Next

You should coordinate with legal experts to understand your responsibility, particularly if any sensitive data was exposed. Work through HR to ensure that all passwords (especially employees’ email accounts) are changed, ideally following a different convention. 

Whaling: One of Many Fraud Threats

Whaling attacks can be far more costly than typical phishing fraud. They’re harder to identify and prevent, too, as they’re built on trust, not tech. While everyone needs to understand the threat, those in higher positions need to be especially aware: you’re the whale the fraudster is hunting.

Whaling prevention needs to be part of an overall risk management and fraud prevention plan. Among other things, this should include employee training, data security programs, and strong internal controls. It should also include chargeback management, to handle fraud that leaks through your defenses. We can help with that… contact us to learn more.

FAQs

What is whaling in cybersecurity?

Whaling is a type of phishing attack that targets high-profile individuals within an organization, such as CEOs, CFOs, and senior executives. Attackers use impersonation tactics to trick their victims into providing sensitive data or conducting fraudulent wire transfers.

What's the difference between phishing, spear-phishing, and whaling?

The difference between whaling and spear phishing is that the former targets a specific, high-ranking executive within an organization. Spear phishing usually goes after a category of execs, usually ones with a lower profile. Plain phishing is a blanket attack where the fraudster is looking for any responders.

What is the difference between BEC and whaling?

Whaling is actually a subcategory of business email compromise (BEC). However, while BEC attackers impersonate high-level executives within the organization, whaling attacks work through those parties by posing as outside associates.

Next Chapter

Vishing

We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form