David, the evil hacker, wants to steal Jenny's data. He sends Jenny an email with a malicious link that looks legitimate. Jenny unknowingly clicks on the link, and it redirects her to a malicious web page, and David steals Jenny's data. Which of the following attacks is described in this scenario?