The sufferer is then invited to enter their private information like lender particulars, bank card data, user ID/ password, etc. Then applying this details the attacker harms the target.Right after acquiring the private facts, they use this information and facts to steal revenue in the user’s account or harm the concentrate on procedure, etc.why