Clone phishing attacks use Beforehand sent but respectable e-mail that contain possibly a website link or an attachment. Attackers create a copy -- or clone -- in the reputable e mail and exchange backlinks or attached files with malicious kinds. Victims in many cases are tricked into clicking to the destructive url or opening the malicious attachm