This more personalizes the phishing attempt, escalating its likeliness to operate. Attackers just have to have a voice sample using a smaller audio clip from the target's supervisor or member of the family.
WHOIS is https://owainerwv890887.blogdigy.com/malware-distribution-an-overview-41966677