CG
SkillsConducting Spearphishing Simulation Campaign
Start Free
Back to Skills Library
Red Team & Offensive Security🟡 Intermediate

Conducting Spearphishing Simulation Campaign

Leverage Spearphishing simulation — targeted social engineering attack vector used by red teams to gain initial access. Unlike broad phishing campaigns, spearphishing uses OSINT-derived intelligence to craf.

3 min read5 MITRE techniques

MITRE ATT&CK Coverage

T1566.001T1566.002T1566.003T1598.003T1204.001

Conducting Spearphishing Simulation Campaign

Overview

Spearphishing simulation is a targeted social engineering attack vector used by red teams to gain initial access. Unlike broad phishing campaigns, spearphishing uses OSINT-derived intelligence to craft highly personalized messages targeting specific individuals. This guide covers developing pretexts, building payloads, setting up email infrastructure, executing the campaign, and tracking results.

Objectives

  • Develop convincing pretexts tailored to specific target personnel
  • Create weaponized payloads that bypass email security controls
  • Set up email delivery infrastructure with proper SPF/DKIM/DMARC configuration
  • Execute phishing campaigns with real-time tracking and metrics
  • Document results for engagement reporting and security awareness improvement

MITRE ATT&CK Mapping

  • T1566.001 - Phishing: Spearphishing Attachment
  • T1566.002 - Phishing: Spearphishing Link
  • T1566.003 - Phishing: Spearphishing via Service
  • T1598.003 - Phishing for Information: Spearphishing Link
  • T1204.001 - User Execution: Malicious Link
  • T1204.002 - User Execution: Malicious File
  • T1608.001 - Stage Capabilities: Upload Malware
  • T1608.005 - Stage Capabilities: Link Target
  • T1583.001 - Acquire Infrastructure: Domains
  • T1585.002 - Establish Accounts: Email Accounts

Implementation Steps

Phase 1: Pretext Development

  1. Review OSINT findings for target personnel profiles
  2. Identify current organizational events (mergers, projects, new hires)
  3. Select pretext theme (IT helpdesk, HR benefits, vendor communication, executive request)
  4. Craft email templates with appropriate urgency and authority cues
  5. Create landing pages that mirror target organization's branding

Phase 2: Payload Development

  1. Select payload type based on target security controls:
  • HTML smuggling for email gateway bypass
  • Macro-enabled documents (if macros not blocked)
  • ISO/IMG files containing LNK payloads
  • OneNote files with embedded scripts
  • QR codes linking to credential harvesting pages
  1. Test payload against target's known security stack
  2. Implement payload obfuscation techniques
  3. Configure callback to C2 infrastructure

Phase 3: Infrastructure Setup

  1. Register convincing look-alike domain
  2. Age domain and build reputation (minimum 2 weeks recommended)
  3. Configure SPF, DKIM, and DMARC records
  4. Set up SMTP relay with GoPhish or custom mail server
  5. Deploy credential harvesting pages with SSL certificates
  6. Configure tracking pixels and click tracking

Phase 4: Campaign Execution

  1. Send test emails to verify delivery and rendering
  2. Launch campaign in waves (avoid mass sending)
  3. Monitor email delivery rates and opens in real-time
  4. Track link clicks and credential submissions
  5. Deploy payloads to users who interact with phishing emails
  6. Capture screenshots and evidence for reporting

Phase 5: Post-Campaign Analysis

  1. Calculate campaign metrics (delivery rate, open rate, click rate, credential capture rate)
  2. Identify users who reported phishing to SOC
  3. Document bypass of email security controls
  4. Map successful compromises to MITRE ATT&CK
  5. Compile findings for engagement report

Tools and Resources

ToolPurposeLicense
GoPhishPhishing campaign managementOpen Source
Evilginx2Real-time credential harvesting with MFA bypassOpen Source
King PhisherPhishing campaign toolkitOpen Source
SET (Social Engineering Toolkit)Multi-vector social engineeringOpen Source
ModlishkaReverse proxy phishingOpen Source
CredSniperCredential harvesting frameworkOpen Source
Fierce PhishPhishing frameworkOpen Source

Validation Criteria

  • [ ] Pretext tailored to specific targets with OSINT data
  • [ ] Payload tested against email security controls
  • [ ] Infrastructure configured with proper email authentication
  • [ ] Campaign tracked with delivery and interaction metrics
  • [ ] Evidence collected for engagement report
  • [ ] Cleanup performed on infrastructure post-campaign

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC4.1 (Monitoring & Evaluation), CC7.1 (Monitoring)
  • ISO 27001: A.14.2 (Secure Development), A.18.2 (Information Security Reviews)
  • NIST 800-53: CA-8 (Penetration Testing), RA-5 (Vulnerability Scanning)
  • NIST CSF: ID.RA (Risk Assessment), PR.IP (Information Protection)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add conducting-spearphishing-simulation-campaign

# Or load dynamically via MCP
grc.load_skill("conducting-spearphishing-simulation-campaign")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add conducting-spearphishing-simulation-campaign
// Or via MCP
grc.load_skill("conducting-spearphishing-simulation-campaign")

Tags

red-teamadversary-simulationmitre-attackexploitationpost-exploitationspearphishingsocial-engineering

Related Skills

Red Team & Offensive Security

Conducting Pass the Ticket Attack

3m·intermediate
Red Team & Offensive Security

Executing Red Team Engagement Planning

3m·intermediate
Red Team & Offensive Security

Performing Open Source Intelligence Gathering

3m·intermediate
Red Team & Offensive Security

Exploiting Active Directory with BloodHound

3m·advanced
Red Team & Offensive Security

Exploiting Ms17 010 Eternalblue Vulnerability

3m·advanced
Red Team & Offensive Security

Performing Kerberoasting Attack

3m·advanced

Skill Details

Domain
Red Team & Offensive Security
Difficulty
intermediate
Read Time
3 min
Code Examples
0
MITRE IDs
5

On This Page

OverviewObjectivesMITRE ATT&CK MappingImplementation StepsTools and ResourcesValidation CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →