Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 79 Topic 8 Discussion

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 79 Topic 8 Discussion

212-89 Exam Topic 8 Question 79 Discussion:
Question #: 79
Topic #: 8

During an internal audit following a surge in unauthorized financial transactions, a multinational investment firm's IR team uncovers evidence of an orchestrated campaign targeting senior staff. The attackers had pieced together fragments of sensitive data by mining executive digital footprints, reviewing online publications, and analyzing company-related mentions on external platforms. Later, they engaged directly with employees under fabricated personas, conducting scripted interviews to extract missing identifiers. With the assembled profile data, the adversaries submitted diversion requests for financial correspondence and used these to impersonate executives and execute fraudulent transfers. Forensic analysis revealed no signs of malware infection or system-level compromise. Which technique best aligns with the adversary's method of obtaining the initial sensitive information?


A.

Phishing through spoofed emails embedded with malicious macros targeting employee laptops


B.

Social engineering using open-source intelligence followed by pretexting


C.

Pharming attack that redirected login traffic from internal systems to malicious replicas


D.

Skimming magnetic card data through modified payment devices in the company cafeteria


Get Premium 212-89 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.