Uh-Oh...

Attempts to trick individuals into clicking on harmful links is incorrect.
Explanation :
BEC attacks specifically use impersonation of executives or trusted contacts to deceive recipients into making unauthorized transactions or disclosing sensitive information.