Using COM automation for effective phishing attacks