Gone phishing, that’s how it all starts.
The adversary gathers email addresses from prior contact list breaches or dark web purchases. Then, using AI, they send a mass amount of sophisticated phishing emails to these users. Once clicked, the adversary gains access to the users’ email account.