In its early stages, phishing attacks were often very simplistic and relied on impersonating reputable sources via written communication, i.e.…