Clone phishing assaults use Formerly delivered but genuine emails that comprise possibly a link or an attachment. Attackers create a duplicate -- or clone -- in the genuine email and substitute inbound links or hooked up files with destructive ones. Victims are sometimes tricked into clicking over the malicious website link or opening the malicious