The attackers pose as legitimate remote IT workers, looking to both generate revenue and access sensitive company data ...