Answer:
The infiltration technique used is Phishing.
Step-by-step explanation:
Phishing is a form of fraud most typically carried out by e-mail or instant messaging, but is also done though phone calls. Attackers pose as a legitimate entity in order to steal confidential information. Victims are manipulated either to click on malicious links, downloading an infected file or, in this case, filling out confidential information.