This method is used extensively to research the victim in advance. What language and design does the company use? Who works with whom, in which department? How do you spend your free time? All of it is information that is often found on the internet on professional networks like Xing or LinkedIn. Finally, an employee is specifically contacted and manipulated with this information in order to obtain the required data or even to make transfers.