David Munson phish requesting cell number

Business Email Compromise attack. Note the generic external email address. You would verify with a known address to determine if it was real.
Business Email Compromise attack. Note the generic external email address. You would verify with a known address to determine if it was real.