Nice Try, But..

Use of malicious software to steal data is incorrect.
Explanation :
BEC attacks specifically use impersonation of executives or trusted contacts to deceive recipients into making unauthorized transactions or disclosing sensitive information.