“... spoofed known contacts ... mimicked previous conversations ... created mail filters to ensure that communications were conducted only between the attacker and victim ... spoofed supervisor emails to get required approvals ... Without the use of any malware ...”
No comments:
Post a Comment