BEC attacks typically leverage the compromise of a trusted third party to conduct a phishing attack against a partner ...
Be aware of some common approaches that are prevalent in scams such as these.