Table Of ContentIntroduction: From Suspicion to CertaintyThe “Pre-Subscribed” Deception: How My Inbox Was CompromisedThe Anatomy of the Scam: The Hackers’…