Attackers will pretend to be someone else in order to gain trust. For instance, to acquire the target's bank information, phishing would be the perfect solution unless the target has no email account. Hence, the attacker first collects or harvests email addresses from the target, and then prepares a scam page that looks and functions exactly like the original bank web interface.
After completing all of the necessary tasks, the attacker then prepares and sends a formal email (for example, the account details), which appears to be from the original bank's website, asking the target to visit a link in order to provide the attacker with up-to-date bank information. By holding qualitative skills on web technologies and using an advanced set of tools (for example, SSLstrip), a social engineer can easily automate this task in an effective manner. With regards to human-assisted scamming, we could accomplish this by physically appearing and impersonating the target's banker identity.