The attackers then use phishing techniques to direct users to the fake site, where they can collect personal details using legitimate-looking fake forms. They usually embed links in a text message, ...