When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Business email compromise
The second stage includes sifting through the documents found in the victims DocuSign account.
That way they can identify high-value targets and formulate the right throw in of approach for maximum efficiency.
They often also look for compromising information which could be used in blackmail.