The two numbers that frame the page
Spear phishing is the targeted, researched form of phishing in which the attacker addresses a specific individual using personalised content drawn from public sources. The category is conceptually older than bulk phishing (it predates the spam-filter era), but the cost profile changed materially in 2024 with the arrival of usable large language model output for lure generation. Two numbers anchor the 2026 picture: $1.76M per successful incident on the defender side, and a 54 percent click-through rate on AI-generated lures against a 12 percent baseline on human-written ones.
The defender-cost figure is from Verizon's 2025 Data Breach Investigations Report, summing the median IR engagement, credential-reset cycle, downstream pivot containment, and data-loss notification spend for breaches where spear phishing was confirmed as the initial vector. The click-through differential is from Hoxhunt's 2026 State of the Phish, which ran a controlled head-to-head test between human-written lures from internal red teams and LLM-generated lures from a current open-weight model, holding target population and delivery channel constant. The Hoxhunt result is now broadly consistent with independent measurements from NCSC UK and CISA field assessments.[Verizon DBIR 2025 + Hoxhunt 2026]