Usually, the hacker will ask the person to click on a link, which will take them to a website where they can enter their login information. Once the person has entered their login information, the hacker will have access to their account.