Attacker gains confidential company information |
Targeted CEO and board members |
|
Attacker posts link to fake AV software |
Broad set of victims |
|
Attacker collecting credit card details |
Phone-based victim |
|
Attacker mass-mails product information to parties that have already opted out of receiving advertisements |
Broad set of recipients |
|
Attacker redirects name resolution entries from legitimate site to fraudulent site |
Victims |
|