Attachment: HTML smuggling with hex strings
Attachment: HTML smuggling with high entropy and other signals
Attachment: HTML smuggling with raw array buffer
Attachment: HTML smuggling with RC4 decryption
Attachment: HTML smuggling with ROT13
Attachment: HTML smuggling with setTimeout
Attachment: HTML with hidden body
Attachment: HTML with JavaScript functions for HTTP requests
Attachment: ICS calendar file with QR code containing recipient email address
Attachment: ICS calendar file with recipient address in UID field
Attachment: ICS file with AWS Lambda URL
Attachment: ICS file with excessive custom properties
Attachment: ICS file with non-Gregorian calendar scale
Attachment: ICS with employee policy review lure
Attachment: Invoice and W-9 PDFs with suspicious creators
Attachment: Legal themed message or PDF with suspicious indicators
Attachment: Link to Doubleclick.net open redirect
Attachment: LNK with embedded content
Attachment: Macro with suspected use of COM ShellBrowserWindow object for process creation
Attachment: Malicious OneNote commands
Attachment: Microsoft 365 credential phishing
Attachment: Office document with VSTO add-in
Attachment: Office file with credential phishing URLs
Attachment: Office file with document sharing and browser instruction lures
Attachment: OLE external relationship containing file scheme link to executable filetype
Attachment: OLE external relationship containing file scheme link to IP address
Attachment: PDF bid/proposal lure with credential theft indicators
Attachment: PDF with a suspicious string and single URL
Attachment: PDF with credential theft language and invalid reply-to domain
Attachment: PDF with link to DMG file download
Attachment: PDF with link to zip containing a wsf file
Attachment: PDF with Microsoft Purview message impersonation
Attachment: PDF with password in filename matching body text
Attachment: PDF with personal Microsoft OneNote URL
Attachment: PDF with suspicious link and action-oriented language
Attachment: RFP/RFQ impersonating government entities
Attachment: Self-sender PDF with minimal content and view prompt
Attachment: Suspicious employee policy update document lure
Attachment: Suspicious PDF created with headless browser
Attachment: SVG file execution
Attachment: USDA bid invitation impersonation
Attachment: Web files with suspicious comments
BEC: Employee impersonation with subject manipulation
BEC/Fraud: Generic scam attempt to undisclosed recipients
BEC/Fraud: Job scam fake thread or plaintext pivot to freemail
BEC/Fraud: Reply-chain manipulation with urgent keywords and self-reply
BEC/Fraud: Scam lure with freemail pivot
BEC/Fraud: Student loan callback phishing