Attachment: Calendar invite from recently registered domain
Attachment: Callback phishing solicitation via image file
Attachment: Callback phishing solicitation via pdf file
Attachment: Callback phishing solicitation via text-based file
Attachment: PDF generated with wkhtmltopdf tool and default title
BEC/Fraud: Urgent language and suspicious sending/infrastructure patterns
Body: PayApp transaction reference pattern
Brand impersonation: AliExpress
Brand impersonation: GitHub with callback scam indicators
Brand impersonation: McAfee
Brand impersonation: Quickbooks
Brand impersonation: QuickBooks notification from Intuit themed company name
Brand impersonation: SiriusXM
Brand impersonation: Vanguard
Brand impersonation: WeTransfer
Callback phishing: AOL senders with suspicious HTML template or PDF attachment
Callback phishing: Branded invoice from sender/reply-to domain less than 30 days old
Callback phishing in body or attachment (untrusted sender)
Callback phishing: Social Security Administration fraud
Callback phishing solicitation in message body
Callback phishing: SumUp infrastructure abuse
Callback phishing via Adobe Sign comment
Callback phishing via calendar invite
Callback phishing via DocuSign comment
Callback phishing via e-signature service
Callback phishing via extensionless rfc822 attachment
Callback phishing via Google Group abuse
Callback phishing via Google Meet
Callback phishing via Intuit service abuse
Callback phishing via Microsoft comment
Callback Phishing via Signable E-Signature Request
Callback phishing via SignFree e-signature request
Callback phishing via Xodo Sign comment
Callback phishing via Yammer comment
Callback phishing via Zelle Service Abuse
Callback phishing via Zoho service abuse
Callback Phishing via Zoom comment
Callback scam: Impersonation via TimeTrade infrastructure
Canva infrastructure abuse
Display Name Emoji with Financial Symbols
Encrypted Microsoft Office files from untrusted sender
Generic service abuse from newly registered domain
Inbound message from popular service via newly observed distribution list
Link: Direct POWR.io Form Builder with suspicious patterns
Link: /index.php enclosed in three asterisks
Link: Invoice or receipt from freemail sender with customer service number
Link: Jensi file preview link from unsolicited sender
Link: Webflow link from unsolicited sender
Link: Zoho form link from unsolicited sender
Message traversed multiple onmicrosoft.com tenants