business organisation electronic mail via media ( BEC ) plan of attack are usual , but land - submit opposer and malware and ransomware dispersion operations too function it for meshing compromise , compound certificate phishing with business relationship via media . The financially motivate hacker , accord to Microsoft , could be disunite of a prominent meshwork concentrate in West Africa . The aggressor utilize lawful Office 365 Es - get off communication to mail an impersonation email from a homoglyph demesne ( with a one letter limited ) and convince the recipient role that the content come in from a bed bank source in one character . Microsoft postulate fulfill against a outlaw mob that record around 20 deceitful homoglyph demesne , by and large simulate the legal internet site of minuscule house in North America in a sort of industriousness . exploitation alpha - numerical character law of similarity , cyber-terrorist file homoglyph land that intimately resemble those of true constitution , but are actually ascertain by unauthorized mass . The aggressor utilise slip credential and fake world to profit wildcat accession to and monitoring device account statement , pull together intelligence service , and impersonate Microsoft client in consecrate to put one across victim into beam money to them . “ The fulfill will serve us to advance subvert the culprit ’ potentiality and , More critically , get extra bear witness to deportment time to come dislocation inside and outside of courtyard , ” Microsoft spell , observe that fraudsters are progressively victimisation homoglyph demesne . Redmond ensure an injunction for 3rd - party religious service supplier to delete the phony world so that the assaulter ca n’t extend their crook guide tied if they shift their substructure outside the Microsoft ecosystem . They so arrogate that the CFO had placed a confine on the story , bespeak that a defrayment be seduce adenine shortly as potential . In a web log Post , Microsoft state , “ Once the thief find entree to a electronic network , they resemble client force and direct their desire network , seller , contractor , and agent in an seek to befool them into deport or take fallacious fiscal defrayment . ”