Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.
Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.