Data Theft Scams Identity Theft Targeted Attacks Spear-Phishing Malware Phishing-as-a-Service Fraudulent Emails Malware Distribution Cryptocurrency Theft Phishing Kits Cardless Cash Scams Adversary-in-the-Middle Attacks Email Scams Smishing Online Fraud Fraudulent Websites Phishing Websites Fraud Data Breach Assassination Plots