The attackers employed the same spear-phishing campaign and used custom look-alike domains to issue payloads and harvest authentication credentials. The collective impact of these compromised ...