Ben purchased a new smartphone and received some updates on it through the OTA method. He received two messages: one with a PIN from the network operator and another asking him to enter the PIN received from the operator. As soon as he entered the PIN, the smartphone started functioning in an abnormal manner.
What is the type of attack performed on Ben in the above scenario?
victorfs
6 months, 4 weeks agoDaniel8660
1 year, 1 month agoDaniel8660
1 year, 2 months agodinonino
1 year, 2 months agoBenoit_G
1 year, 3 months agoMyName7
1 year, 3 months agoMimshack
2 years, 2 months agoLoneStarChief
2 years, 1 month ago