What type of Social Engineering is the following scenario?
Sarah, an avid online shopper, decides to browse her favourite e-commerce website to purchase a new laptop. She enters the website's URL into her browser and eagerly awaits the familiar homepage to load. Unbeknownst to Sarah, a pharming attack has compromised the website's DNS infrastructure, redirecting her to a fraudulent version of the site.
The fake website closely mimics the legitimate e-commerce platform, displaying enticing offers and showcasing a wide range of products. Sarah, believing she is on the genuine website, proceeds to search for the desired laptop model. She adds the product to her cart and proceeds to the checkout page.
At the checkout, Sarah enters her personal and payment information, including her name, address, credit card details, and security code. Unaware that the website is fraudulent, she trusts that her transaction is secure and submits the information.