Watch this video on YouTube
An attacker sends an email to an employee pretending to be from the IT department and asks the employee to reset their password using a provided link. This is an example of: