figure8 | WeLiveSecurity

figure8

Figure 7: Example of an exfiltration email