Attacker acquires credentials from the password dump site. Automated tools are used to test credentials across a variety of different sites. When a successful login occurs, the attacker harvests the sensitive data. The given attack sequence corresponds to: