When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

The actor will generate a legitimate equipment code authentication request, and then send the code to the victim.

The attacker can also use the compromised account to message or email colleagues with additional phishing messages.

Phishing

Storm-2372 messages to establish rapport

Storm-2372 attack flow