Jason is at home, attempting to access his music store's website. When he visits the website, he is greeted with a basic form that requests his name, email address, and phone number. This is not the website of a music retailer. Jason is certain that the website has been hacked. How did the attacker accomplish the hack?