Impersonation, social engineering, and use of compromised accounts to bait potential victims were some trends examined