John downloaded alten cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to john’s passwords and credit card information. In this scenario, it is evident that john was a victim of _____.