As a system administrator for a medium-sized corporation, you notice an unusual email being circulated within the company. The email in question appears to be from the CEO requesting urgent wire transfers to a new vendor due to an alleged internal system audit. Which type of attack is most likely occurring and what immediate action should you take to mitigate the risks?
Reply to the email asking for more details about the vendor and the audit.
Forward the email to other department heads to quickly fulfill the CEO's request.
Verify the request via a direct phone call to the CEO and alert the IT security team.
Comply with the email directives and perform the wire transfer to the new vendor.