The attacker sent a fraudulent email with a malicious attachment to employees of the target organization. When an employee opened the email and clicked on the attachment, the malware was downloaded and injected into the software on the victim’s system. The malware then propagated to other networked systems, ultimately damaging an industrial automation component. Which of the following attack techniques did the attacker use?