Attachment: ICS calendar file with QR code containing recipient email address
Attachment: ICS calendar file with recipient address in UID field
Attachment: ICS calendar with embedded file from internal sender with SPF failure
Attachment: ICS file with AWS Lambda URL
Attachment: ICS file with excessive custom properties
Attachment: ICS file with links to newly registered domains
Attachment: ICS file with meeting prefix
Attachment: ICS file with non-Gregorian calendar scale
Attachment: ICS with embedded document
Attachment: ICS with embedded Javascript in SVG file
Attachment: ICS with employee policy review lure
Attachment: Invoice and W-9 PDFs with suspicious creators
Attachment: JavaScript file with suspicious base64-encoded executable
Attachment: Legal themed message or PDF with suspicious indicators
Attachment: Link file with UNC path
Attachment: Link to Doubleclick.net open redirect
Attachment: LNK with embedded content
Attachment: Macro files containing MHT content
Attachment: Macro with suspected use of COM ShellBrowserWindow object for process creation
Attachment: Malformed OLE file
Attachment: Malicious OneNote commands
Attachment: Microsoft 365 credential phishing
Attachment: Microsoft impersonation via PDF with link and suspicious language
Attachment: MSI installer file
Attachment: MS Office or RTF file with Shell.Explorer.1 com object with embedded LNK
Attachment: Office document loads remote document template
Attachment: Office document with VSTO add-in
Attachment: Office file contains OLE relationship to credential phishing page
Attachment: Office file with credential phishing URLs
Attachment: Office file with document sharing and browser instruction lures
Attachment: Office file with suspicious function calls or downloaded file path
Attachment: Password-protected PDF with fake document indicators
Attachment: PDF bid/proposal lure with credential theft indicators
Attachment: PDF contains W9 or invoice YARA signatures
Attachment: PDF file with link to fake Bitcoin exchange
Attachment: PDF file with low reputation links to suspicious filetypes (unsolicited)
Attachment: PDF file with low reputation link to ZIP file (unsolicited)
Attachment: PDF generated with wkhtmltopdf tool and default title
Attachment: PDF Object Hash - Encrypted PDFs with fake payment notification
Attachment: PDF proposal with credential theft indicators
Attachment: PDF with a suspicious string and single URL
Attachment: PDF with credential theft language and invalid reply-to domain
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
Attachment: PDF with CVE-2026-34621 lures
Attachment: PDF with JSFck obfuscation
Attachment: PDF with link to DMG file download
Attachment: PDF with link to zip containing a wsf file
Attachment: PDF with Microsoft Purview message impersonation
Attachment: PDF with multistage landing - ClickUp abuse