Link: Romance/Sexual Language With Suspicious Link
Link: ScreenConnect installer with suspicious relay domain
Link: Secure SharePoint file share from new or unusual sender
Link: Self-sender with sender org in subject and credential theft indicator
Link: Self-sent message with quarterly document review request
Link: SharePoint filename matches org name
Link: Shortened URL with fragment matching subject
Link: Spam website with evasion indicators
Link: Suspicious go.php redirect with document lure
Link: Suspicious SharePoint document name
Link: Suspicious URL with recipient targeting and special characters
Link: Tax document lure Portuguese/Spanish with suspicious domains
Link to auto-downloaded file with Google Drive branding
Link to Google Apps Script macro via comment tagging
Link: Tycoon2FA phishing kit (non-exhaustive)
Link: Uncommon SharePoint document type with sender's display name
Link: URL fragment with hexadecimal pattern obfuscation
Link: URL scheme obfuscation via split HTML anchors
Link: URL shortener with copy-paste instructions and credential theft language
Link: Webflow link from unsolicited sender
Link: WordPress admin targeting with recipient identifier in URL fragment
Link: WordPress login page with Blogspot Binance scam
Link: Zoho form link from unsolicited sender
Low reputation link to auto-downloaded HTML file with smuggling indicators
Mass campaign: Cross Site Scripting (XSS) attempt
Microsoft device code phishing
Non-RFC compliant calendar files from unsolicited sender
Notion suspicious file share
Observed IOC: Malicious domains in body links
Observed IOC: Malicious root domains in body links
Observed IOC: Malicious URLs in body links
Open redirect: Cartoon Network
Open redirect: giving.lluh.org
Open redirect (go2.aspx) leading to Microsoft credential phishing
Open Redirect: Google domain with /url path and suspicious indicators
Open redirect: marketing.edinburghairport.com
Open redirect: people.anuneo.com
Open redirect: slubnaglowie.pl
Open redirect: typedrawers.com
Outlook hyperlink bypass: left-to-right mark (LRM) in base HTML tag
PDF attachment with Google (AE) redirecting to a php or zip file
PhaaS: Impact Solutions (Impact Vector Suite)
Potential prompt injection attack in body HTML
QR Code with suspicious indicators
Reconnaissance: All recipients cc/bcc'd or undisclosed
Reconnaissance: Email address harvesting attempt
Reconnaissance: Empty message from uncommon sender