figure8

figure8

Figure 7: Example of an exfiltration email