Attachment: HTML smuggling with raw array buffer
Attachment: HTML smuggling with RC4 decryption
Attachment: HTML smuggling with ROT13
Attachment: HTML smuggling with setTimeout
Attachment: HTML smuggling with unescape
Attachment: HTML with obfuscation and recipient's email in JavaScript strings
Attachment: JavaScript file with suspicious base64-encoded executable
Attachment: Macro files containing MHT content
Attachment: Malicious OneNote commands
Attachment: MSI installer file
Attachment: Office document loads remote document template
Attachment: Office document with VSTO add-in
Attachment: Office file with credential phishing URLs
Attachment: Office file with document sharing and browser instruction lures
Attachment: Office file with suspicious function calls or downloaded file path
Attachment: OLE external relationship containing file scheme link to executable filetype
Attachment: OLE external relationship containing file scheme link to IP address
Attachment: PDF file with low reputation links to suspicious filetypes (unsolicited)
Attachment: PDF file with low reputation link to ZIP file (unsolicited)
Attachment: PDF with link to DMG file download
Attachment: PDF with link to zip containing a wsf file
Attachment: PowerShell content
Attachment: QR code with encoded recipient targeting and redirect indicators
Attachment: QR code with suspicious URL patterns in EML file
Attachment: RDP connection file
Attachment: RTF file with suspicious link
Attachment soliciting user to enable macros
Attachment: SVG file execution
Attachment: Uncommon compressed file
Attachment: WinRAR CVE-2025-8088 exploitation
Attachment with auto-executing macro (unsolicited)
Attachment with auto-opening VBA macro (unsolicited)
Attachment with encrypted zip (unsolicited)
Attachment with macro calling executable
Attachment with unscannable encrypted zip (unsolicited)
Attachment with VBA macros from employee impersonation (unsolicited)
Attachment: ZIP file with CVE-2026-0866 exploit
HTML smuggling containing recipient email address
Link: Commonly Abused Web Service redirecting to ZIP file
Link to auto-downloaded disk image in encrypted zip
Link to auto-downloaded DMG in archive
Link to auto-downloaded DMG in encrypted zip
Link to auto-download of a suspicious file type (unsolicited)
MalwareBazaar: Malicious attachment hash in archive (trusted reporters)
Malware: Pikabot delivery via URL auto-download
Non-RFC compliant calendar files from unsolicited sender
QR code to auto-download of a suspicious file type (unsolicited)