The offender Therefore needed to either have acquired access to the accounts, which include through hacking, or spoofed them to generate the appearance the e-mails came from the ministry, many cybersecurity authorities informed The Epoch Times.One more reporter from NYTimes stops me for a quick Q&A, and I haven’t even created it up the hall never