How an attacker can target phishing attacks