Adobe branded PDF file linking to a password-protected file from untrusted sender
Attachment: 7z Archive Containing RAR File
Attachment: Any HTML file (unsolicited)
Attachment: Any HTML file within archive (unsolicited)
Attachment: Any .sap file (unsolicited)
Attachment: Archive containing disallowed file type
Attachment: Archive containing HTML file with file scheme link
Attachment: Archive contains DLL-loading macro
Attachment: Archive with embedded CHM file
Attachment: Archive with embedded EXE file
Attachment: Archive with pdf, txt and wsf files
Attachment: Base64 encoded bash command in filename
Attachment: Calendar file with invisible Unicode characters
Attachment: Calendar invite from recently registered domain
Attachment: Calendar invite with Google redirect and invoice request
Attachment: Callback phishing solicitation via pdf file
Attachment: Callback phishing solicitation via text-based file
Attachment: cmd file extension
Attachment: Cold outreach with invitation subject and not attachment
Attachment: Compensation review lure with QR code
Attachment: Credit card application with WhatsApp contact
Attachment: .csproj with suspicious commands
Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability
Attachment: CVE-2023-21716 - Microsoft Office Remote Code Execution Vulnerability
Attachment: CVE-2025-24071 - Microsoft Windows File Explorer Spoofing Vulnerability
Attachment: Decoy PDF author (Julie P.)
Attachment: DocuSign impersonation via PDF linking to new domain
Attachment: DOCX with hyperlink targeting recipient address
Attachment: Double base64-encoded zip file in HTML smuggling attachment
Attachment: Dropbox image lure with no Dropbox domains in links
Attachment: EICAR string present
Attachment: Embedded Javascript in SVG file
Attachment: Embedded VBScript in MHT file (unsolicited)
Attachment: EML containing a base64 encoded script
Attachment: EML file contains HTML attachment with login portal indicators
Attachment: EML file with HTML attachment (unsolicited)
Attachment: EML file with IPFS links
Attachment: EML with embedded Javascript in SVG file
Attachment: EML with Encrypted ZIP
Attachment: EML with link to credential phishing page
Attachment: EML with QR code redirecting to Cloudflare challenges
Attachment: EML with SharePoint files shared from GoDaddy federated tenants
Attachment: EML with Sharepoint link likely unrelated to sender
Attachment: EML with suspicious indicators
Attachment: Emotet heavily padded doc in zip file
Attachment: Employment contract update with suspicious file naming
Attachment: Encrypted Microsoft Office file (unsolicited)
Attachment: Encrypted PDF with credential theft body
Attachment: Encrypted ZIP containing VHDX file
Attachment: Encrypted zip file with payment-related lure