The aftermath what follows a social engineering attack? 2 Great real life examples :