Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community

Abstract

This report describes an inexpensive and technically simple phishing operation. It shows that the continued low adoption rates for digital security features, such as two factor authentication, contribute to the low bar to entry for digital espionage

    Similar works