How attackers use compromised accounts to social engineer victims via chat
This demo requires JavaScript to be enabled.