Menu
Sign In Pricing Add Podcast

Darknet Diaries

141: The Pig Butcher

1983.982 - 2004.494 Ronnie Tokazowski

Yeah. So business email compromise, in most of the cases, it does not use malware. It does not employ any of those tactics around trying to install software on the computer. At most, they will do credential phishing where they'll try and harvest the email credentials and email passwords. But for a vast majority of business email compromise, there is no malware tied to that.

0
💬 0

Comments

There are no comments yet.

Log in to comment.