The compromise originated on one of our colleagues’
computers. To investigate, you must access a colleague’s
inbox within our company email domain and search for
suspicious messages or attachments that may contain the
threat.
If you require guidance, feel free to talk to me.