The sufferer is then invited to enter their private facts like financial institution information, credit card info, user ID/ password, etcetera. Then employing this details the attacker harms the target.After finding the personal facts, they use this data to steal funds in the consumer’s account or damage the focus on system, etc.Serangan rekayas