Umeti's co-conspirators Okwonna and Butaish used phishing and malware to access victim companies' computers in the scheme.
[
Collection
]
[
|
...
]
Umeti's co-conspirators Okwonna and Butaish used phishing and malware to access victim companies' computers in the scheme.