Danny, a black hat hacker, primarily gets into the network of his victim’s by sending them an email with a malicious link. Email is designed to look legitimate and official. Victim clicks the link and the malware downloads to the victim’s computer without the victim’s knowledge. Malware spread to the entire network of the organization. This type of attack is known as: