Advance Fee Fraud (AFF) from freemail provider or suspicious TLD
Anthropic Magic String in HTML
Attachment: Adobe image lure in body or attachment with suspicious link
Attachment: Base64 encoded bash command in filename
Attachment: Calendar file with invisible Unicode characters
Attachment: Calendar invite with suspicious link leading to an open redirect
Attachment: Callback phishing solicitation via image file
Attachment: Callback phishing solicitation via text-based file
Attachment: Cold outreach with invitation subject and not attachment
Attachment: Credit card application with WhatsApp contact
Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability
Attachment: CVE-2023-21716 - Microsoft Office Remote Code Execution Vulnerability
Attachment: CVE-2025-24071 - Microsoft Windows File Explorer Spoofing Vulnerability
Attachment: Decoy PDF author (Julie P.)
Attachment: DocX embedded binary
Attachment: Double base64-encoded zip file in HTML smuggling attachment
Attachment: Dropbox image lure with no Dropbox domains in links
Attachment: EML file contains HTML attachment with login portal indicators
Attachment: EML file with HTML attachment (unsolicited)
Attachment: EML with link to credential phishing page
Attachment: EML with SharePoint files shared from GoDaddy federated tenants
Attachment: EML with suspicious indicators
Attachment: Emotet heavily padded doc in zip file
Attachment: Employment contract update with suspicious file naming
Attachment: Encrypted PDF with credential theft body
Attachment: Encrypted zip file with payment-related lure
Attachment: Excel file with document sharing lure created by Go Excelize
Attachment: Fake lawyer & sports agent identities
Attachment: Fake scan-to-email
Attachment: Fake secure message and suspicious indicators
Attachment: Fake voicemail via PDF
Attachment: Fictitious invoice using LinkedIn's address
Attachment: Finance themed PDF with observed phishing template
Attachment: HTML attachment with Javascript location
Attachment: HTML file with excessive 'const' declarations and abnormally long timeouts
Attachment: HTML file with reference to recipient and suspicious patterns
Attachment: HTML smuggling 'body onload' linking to suspicious destination
Attachment: HTML smuggling 'body onload' with high entropy and suspicious text
Attachment: HTML smuggling Microsoft sign in
Attachment: HTML smuggling with atob and high entropy
Attachment: HTML smuggling with auto-downloaded file
Attachment: HTML smuggling with base64 encoded JavaScript function
Attachment: HTML smuggling with base64 encoded ZIP file
Attachment: HTML smuggling with concatenation obfuscation
Attachment: HTML smuggling with decimal encoding
Attachment: HTML smuggling with embedded base64-encoded ISO
Attachment: HTML smuggling with embedded base64 streamed file download
Attachment: HTML smuggling with eval and atob
Attachment: HTML smuggling with excessive line break obfuscation
Attachment: HTML smuggling with fromCharCode and other signals