David Munson phish requesting cell number
Business Email Compromise attack. Note the generic external email address. You would verify with a known address to determine if it was real.
Business Email Compromise attack. Note the generic external email address. You would verify with a known address to determine if it was real.