Clone phishing assaults use Beforehand shipped but respectable emails that have possibly a connection or an attachment. Attackers make a duplicate -- or clone -- in the legit e-mail and swap one-way links or attached information with malicious types. Victims will often be tricked into clicking about the malicious url or opening the malicious attach