The attacker then asks the victim to enter a one-time password, accept a push notification, or complete a different type of ...