I love reverse engineering threat actor playbooks, scams, etc (you probably can tell from my last few posts). I’ve posted about my research on this many times on this blog. Medium.com just posted a break down of a scam found HERE. What I like about their approach is this pause between each step and break down how to flag the data at the step as a scam. By understanding this logic, the average person should be able to identify the scam as it progresses. Its worth the read