Attackers use emails to prompt victims to call a fraudulent call center, where attackers instruct them to download a malicious file.
Attackers use emails to prompt victims to call a fraudulent call center, where attackers instruct them to download a malicious file.