Crime ❯Cybercrime ❯Impersonation
Impersonation Hacking Government Officials Billionaires Social Media Investigative Journalism Data Breaches Executive Management Tech Industry Transportation
The scheme exploits contact information stolen from Wiles’s personal device hacked last year.