Ransomware Pirates are gathering company log-ins from employee personal emails. Why? If hackers can’t penetrate your company defenses, some are conducting what Sun Tzu terms an indirect attack. They use social media to identify your employees and then attack their personal email accounts. Those typically have less protection than your company systems. The pirates search for company log-in credentials in emails or in related unprotected text apps like Google Notes or Microsoft OneNote. Next step is logging into your company systems.