A security analyst is reviewing the organization's incident reports and notices an incident where attackers sent deceptive messages to employees' mobile phones with the intent to trick them into sharing sensitive information. What type of attack does this scenario describe?
SMS phishing
Spyware Installation
Exploit Kits via MMS
Direct Malware Injection