• The fraudster gathers all the required information about the target
  • the fraudster contacts the potential victim and initiates a communication in some way
  • The fraudster consciously manipulates the victim to obtain the required information without making the victim realize that a security breach is occurring
  • The data thus collected from victim is used by fraudster to commit financial theft, hack the accounts, gain unauthorized access, hack accounts etc.,