To get ready for the spear phishing assault, a cybercriminal researches their victims to collect details they could use to move as a trusted source. Making use of that data, the spear phisher contacts their target through textual content concept or e mail, looking to get them to click on a malicious link or disclose confidential knowledge or other