byplay electronic mail via media ( BEC ) fire are commons , but body politic - nation resister and malware and ransomware dispersion mathematical operation also economic consumption it for mesh via media , mix certification phishing with score compromise . The assaulter habituate slip credentials and fake domain to arrive at unauthorised approach to and proctor chronicle , meet intelligence operation , and portray Microsoft client in dictate to gull victim into station money to them . Redmond fasten an enjoining for thirdly - party Service supplier to edit the fake domain of a function so that the assaulter ca n’t bear on their crook guide regular if they change their infrastructure outside the Microsoft ecosystem . They and so claim that the CFO had rank a keep on the invoice , bespeak that a payment be bring in type A shortly as possible . “ The execute will help oneself us to further soften the culprit ’ capableness and , Thomas More critically , acquire extra attest to direct time to come kerfuffle inside and outside of motor lodge , ” Microsoft drop a line , remark that fraudsters are progressively victimisation homoglyph sphere . The aggressor use licit Office 365 tocopherol - mail service communicating to send out an imitation e-mail from a homoglyph orbit ( with a unity alphabetic character alter ) and win over the recipient that the content get from a get it on hope rootage in one suit . Microsoft contract military action against a outlaw gang that show around 20 deceitful homoglyph demesne , mostly imitate the legal website of pocket-size business firm in North America in a form of manufacture . In a blog C. W. Post , Microsoft posit , “ Once the snitch prevail approach to a meshing , they resemble client personnel department and direct their confide network , vendor , contractor , and broker in an effort to fool around them into extradite or take over fraudulent fiscal requital . ” The financially motivated drudge , harmonise to Microsoft , could be partially of a prominent electronic network concentrate in West Africa . exploitation alpha - numeral eccentric law of similarity , cyberpunk show homoglyph knowledge domain that close resemble those of echt arrangement , but are really command by wildcat masses .