Modus Operandi
- The fraudster gathers all the required information about the target
- the fraudster contacts the potential victim and initiates a communication in some way
- The fraudster consciously manipulates the victim to obtain the required information without making the victim realize that a security breach is occurring
- The data thus collected from victim is used by fraudster to commit financial theft, hack the accounts, gain unauthorized access, hack accounts etc.,