A cybercriminal copies the name, profile photograph, and essential info from another person’s real account to create a copycat account.The sufferer is then invited to enter their personalized information like financial institution facts, charge card details, consumer id/ password, and many others. Then making use of this facts the attacker harms