To really make it more difficult for adversaries to entry consumer credentials, extra credentials will need to be used. Usually, these actors deploy malware into the method by using phishing email messages together with other social engineering tools. It might also include hacking right into a network and exploiting vulnerabilities https://ieeexplore.ieee.org/document/9941250