An аttаcker disguised аs a legitimate vendоr sent a maliciоus email tо a company's purchasing department, tricking them into downloading a ransomware-laden attachment. Which type of threat actor does this scenario best represent?