BEC/Fraud: Urgent language and suspicious sending/infrastructure patterns
BEC with unusual reply-to or return-path mismatch
Benefits enrollment impersonation
Body: Embedded email headers indicative of thread hijacking/abuse
Body HTML: Comment with 24-character hex token
Body: PayApp transaction reference pattern
Body: Suspicious date format
Brand impersonation: AARP
Brand impersonation: Adobe Sign with suspicious indicators
Brand impersonation: Adobe with suspicious language and link
Brand impersonation: AliExpress
Brand impersonation: Amazon Web Services (AWS)
Brand impersonation: Aquent
Brand impersonation: Aramco
Brand impersonation: AuthentiSign
Brand impersonation: Automobile assistance associations
Brand impersonation: Binance
Brand impersonation: Box file sharing service
Brand impersonation: Coinbase with suspicious links
Brand impersonation: Discord notification
Brand Impersonation: Disney
Brand impersonation: DocuSign branded attachment lure with no DocuSign links
Brand impersonation: DocuSign with embedded QR code
Brand impersonation: Dropbox
Brand impersonation: Enbridge
Brand impersonation: Evite
Brand impersonation: Fake DocuSign HTML table not linking to DocuSign domains
Brand impersonation: Fake Fax
Brand impersonation: File sharing notification with template artifacts
Brand Impersonation: Gemini Trust Company
Brand impersonation: GitHub with callback scam indicators
Brand impersonation: Google Careers
Brand impersonation: Google Drive fake file share
Brand impersonation: Google Meet with malicious link
Brand impersonation: Google using Microsoft Forms
Brand impersonation: Google Workspace alert notification
Brand impersonation: Greenvelope
Brand impersonation: Gusto
Brand impersonation: Interac
Brand impersonation: Internal Revenue Service
Brand impersonation: LastPass
Brand impersonation: Mailchimp
Brand impersonation: Marriott with gift language
Brand impersonation: McAfee
Brand impersonation: Microsoft
Brand impersonation: Microsoft fake sign-in alert
Brand impersonation: Microsoft logo in HTML with fake quarantine release notification
Brand impersonation: Microsoft logo or suspicious language with open redirect
Brand impersonation: Microsoft Planner with suspicious link
Brand impersonation: Microsoft quarantine release notification in body