The attack starts with a hacked Microsoft ... Then, the attackers would compromise someone’s email account, and use it to ...