Just in case you need a sample of what might have happened: This is what amnesty international published just these days.
Summary
- We have identified several campaigns of
credentials phishing, likely operated by the same attackers, targeting
hundreds of individuals spread across the Middle East and North Africa.
- In one campaign, the attackers were particularly going after
accounts on popular self-described “secure email” services, such as Tutanota and ProtonMail.
- In another campaign, the attackers have been targeting hundreds of
Google and Yahoo accounts, successfully bypassing common forms of
two-factor authentication.
<p>Just in case you need a sample of what might have happened: This is what <a mce_href="https://www.amnesty.org/en/latest/research/2018/12/when-best-practice-is-not-good-enough/" target="_blank" href="https://www.amnesty.org/en/latest/research/2018/12/when-best-practice-is-not-good-enough/">amnesty international published</a> just these days.</p><blockquote><h2 style="margin: 0cm; margin-bottom: .0001pt;"><span>Summary</span></h2>
<ul><li><span><span>We have&nbsp;</span></span>identified several campaigns of
credentials phishing, likely operated by the same attackers, targeting
hundreds of individuals spread across the Middle East and North Africa.</li><li>In one&nbsp;campaign, the attackers were particularly going after
accounts on popular self-described “secure email” services, such as <b>Tutanota</b> and <b>ProtonMail</b>.</li><li>In another&nbsp;campaign, the attackers have been targeting hundreds of
Google and Yahoo accounts, successfully bypassing common forms of
two-factor authentication.</li></ul></blockquote>
Michael -- IERenderer's Homepage PGP Key ID (RSA 2048): 0xC45D831B S/MIME Fingerprint: 94C6B471 0C623088 A5B27701 742B8666 3B7E657C