Common examples include payment diversion, fraudulent fund transfers, and impersonation schemes (such as fake vendor or executive emails). Coverage may be included under social engineering extensions in cyber policies, though strict definitions and control prerequisites (such as dual authorisation for payments) typically apply.