Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson's machine.
What is the social engineering technique Steve employed in the above scenario?
beowolf
Highly Voted 3 years, 1 month agoblacksheep6r
3 years agoANDRESCB1988
Highly Voted 3 years, 3 months agoinsaniunt
Most Recent 9 months agoshubhrant666
11 months, 2 weeks agosudowhoami
11 months, 3 weeks agoCiruuss_
1 year agoCiruuss_
1 year, 1 month agoCiruuss_
1 year agoostorgaf
1 year, 1 month agoVincent_Lu
1 year, 2 months agoCHCHCHC
1 year, 2 months agovictorfs
1 year, 5 months agojeremy13
1 year, 5 months agoWhite_T_10
1 year, 5 months agoounuomi
1 year, 6 months agoBob_234
1 year, 7 months agoVOAKDO
1 year, 9 months agonoblethic
1 year, 9 months ago