How can we do a fabrication attack? [closed]


I have heard an attack-type known as “fabrication” which means attacking targets via impersonating real senders.

How can we do this kind of attack? If you give some examples other than phishing, that would be useful.