Instead of sending fake invoices or money transfer requests, attackers attempt to ‘purchase’ high-value goods such as construction materials, agricultural supplies, IT hardware, and solar energy products.
Support the originator by clicking the read the rest link below.