Business Email Compromise Timeline

Outline of how the business email compromise is executed by some organized crime groups, from identifying a target to grooming to exchanging information to receiving a wire transfer from the victim.
Business Email Compromise Timeline
Click to view full-size image… Size: 908KB