How the adversary-in-the-middle technique is used in spearphishing attacks

Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?