Attachment: PDF with password in filename matching body text
Attachment: PDF with personal Microsoft OneNote URL
Attachment: PDF with recipient email in link
Attachment: PDF with ReportLab library and default metadata
Attachment: PDF With SAI Global ISO9001 Logo
Attachment: PDF with split QR code
Attachment: PDF with suspicious HeadlessChrome metadata
Attachment: PDF with suspicious language and redirect to suspicious file type
Attachment: PDF with suspicious link and action-oriented language
Attachment: PDF with suspicious view document characteristics
Attachment: Potential sandbox evasion in Office file
Attachment: PowerPoint with suspicious hyperlink
Attachment: PowerShell content
Attachment: QR code link with base64-encoded recipient address
Attachment: QR code with encoded recipient targeting and redirect indicators
Attachment: QR code with recipient targeting and special characters
Attachment: QR code with suspicious URL patterns in EML file
Attachment: QR code with userinfo portion
Attachment: RDP connection file
Attachment: RFC822 containing suspicious file sharing language with links from untrusted sender
Attachment: RFP/RFQ impersonating government entities
Attachment: RTF file with suspicious link
Attachment: RTF with embedded content
Attachment: Self-sender PDF with minimal content and view prompt
Attachment: SFX archive containing commands
Attachment: Small text file with link containing recipient email address
Attachment: Soda PDF producer with encryption themes
Attachment soliciting user to enable macros
Attachment: Suspicious employee policy update document lure
Attachment: Suspicious PDF created with headless browser
Attachment: SVG file execution
Attachment: SVG files with evasion elements
Attachment: TAR file with RAR type
Attachment: Uncommon compressed file
Attachment: USDA bid invitation impersonation
Attachment: Web files with suspicious comments
Attachment: WinRAR CVE-2025-8088 exploitation
Attachment with auto-executing macro (unsolicited)
Attachment with auto-opening VBA macro (unsolicited)
Attachment with encrypted zip (unsolicited)
Attachment with high risk VBA macro (unsolicited)
Attachment with macro calling executable
Attachment with suspicious author (unsolicited)
Attachment with unscannable encrypted zip (unsolicited)
Attachment with VBA macros from employee impersonation (unsolicited)
Attachment: XLSX file with suspicious print titles metadata
Attachment: ZIP file with CVE-2026-0866 exploit
BEC/Fraud: Job scam fake thread or plaintext pivot to freemail
Brand impersonation: Amazon with suspicious attachment
Brand impersonation: Chase bank with credential phishing indicators