Summary by Epenetus-Matias-Putra This can be done by attackers to carry out phishing/spread viruses or fake content.