Mark Alpatsky
CERT-GIB Senior analyst
Sharef Hlal
Head of Digital Risk Protection Analytics Team, MEA region
Key Findings
Detecting the scammer’s infrastructure
How the scheme works
Uncovering the scammer’s infrastructure
Conclusion
How to avoid falling victim to phishing attacks
If you found this article helpful, share it with your friends!