Which technique used by a threat actor is known as spam?
An attacker observes websites that a targeted group visits, and herds them into an infected website
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
Weaponized emails that claim to come from a legitimate sender
Fraudulent messages that target a specific role or person within an organization