A widespread attack method used by cybercriminals is compromising (business) emails. For example, users receive an email from a supervisor,…