This article has been indexed from Trend Micro Simply Security
We analyzed five major types of email channels, and the techniques in keywords and domain names BEC actors use to appear legitimate to potential victims.
Read the original article: Analyzing Email Services Abused for Business Email Compromise