The fraud is carried out by fraudsters compromising and/or “spoofing” legitimate business email accounts through social engineering or computer intrusion techniques, to cause employees of the victim company or other individuals involved in legitimate business transactions to transfer funds to accounts controlled by the scammers…