An employee receives an email from an unknown sender claimin…
An employee receives an email from an unknown sender claiming to be from the IT department.The email states that there is a login issue on the network and that the user needs to run the file to resolve the problem. The executable file prompts the user to input a network password, which the threat actor records. What social engineering technique is the threat actor using in this scenario?
Read Details