The attacker tricks a user into running malware to compromise the latter’s device or gain unauthorised network access by sending a phishing email and/or malicious social media messages.
Time scale
Hours – days
Tactics used
- Targeted phishing emails
- Social engineering