Alex, a malicious hacker, aimed to breach a company's network and redirect its web traffic to a malicious site. To achieve this, Alex performed DNS cache poisoning, exploiting vulnerabilities in the DNS server software. By manipulating the legitimate IP address of the target website, Alex redirected users to a fraudulent site. What method did Alex employ to gather information for identity theft?