This article describes Spear Phishing and Business Email Compromise and how to submit samples to Sophos for analysis.