"Armed with a few working logins, the spear-phisher accesses corporate intellectual property, personnel files or other sensitive data, which can fetch a high price on the black market." . . . . .