No, an attacker cannot simply modify data and send it along with the hash for the modified data because a fundamental property of cryptographic hash functions is that even a tiny change in the original data will result in a significantly different hash value, making it readily detectable if the recipient recalculates the hash on the received data and compares it to the original hash