An attack relies on an end user visiting a website the end user would typically visit; however, the site is compromised and uses vulnerabilities in the end user’s browser to deploy malicious software. Which of the following types of attacks does this describe?
A. Smishing
B. Whaling
C. Watering hole
D. Phishing