Select a specific phishing attack tool/method (NOT vishing, BEC, CEO fraud) such as Emotet, Blackhole etc. etc. and explain how the attack works along with how we, as defenders, can prevent this attack from being successful.