Figure4

Figure4

Figure 4 – Description of the malicious service taken from Google’s Terms of Service