https://ift.tt/LZQ7HOG
Attackers use automated voice calls, social media ads and SMS messages to lure targets.