Brand impersonation: Coinbase with suspicious links
Brand impersonation: DocuSign PDF attachment with suspicious link
Brand impersonation: Dropbox
Brand impersonation: Google fake sign-in warning
Brand impersonation: Microsoft fake sign-in alert
Brand impersonation: Microsoft quarantine release notification in body
Brand impersonation: Microsoft quarantine release notification in image attachment
Brand impersonation: Microsoft Teams
Brand impersonation: Microsoft with low reputation links
Brand impersonation: Norton
Brand Impersonation: PayPal
Brand impersonation: Proofpoint secure messaging without legitimate indicators
Brand impersonation: Sharepoint
Brand impersonation: SharePoint PDF attachment with credential theft language
Business Email Compromise (BEC) attempt from unsolicited sender
Callback phishing: AOL senders with suspicious HTML template or PDF attachment
Callback phishing in body or attachment (untrusted sender)
Callback phishing: Social Security Administration fraud
Callback phishing solicitation in message body
Callback phishing via calendar invite
Callback phishing via extensionless rfc822 attachment
Callback phishing via Google Group abuse
Commonly abused sender TLD with engaging language
Credential phishing: Image as content, short or no body contents
Encrypted Microsoft Office files from untrusted sender
Extortion / sextortion in attachment from untrusted sender
Extortion / Sextortion - PDF attachment leveraging breach data from freemail sender
Free subdomain link with login or captcha (untrusted sender)
HTML smuggling containing recipient email address
Impersonation: Fake Gmail attachment
Impersonation: Recipient organization in sender display name with credential theft image
Link: Direct POWR.io Form Builder with suspicious patterns
Link: Microsoft Dynamics 365 form phishing
Link: Microsoft protected message with matching sender and recipient addresses
Link: QR code in EML attachment with credential phishing indicators
Link: QuickBooks image lure with suspicious link
Link: ScreenConnect installer with suspicious relay domain
Link to auto-downloaded disk image in encrypted zip
Link to auto-downloaded DMG in archive
Link to auto-downloaded DMG in encrypted zip
Link to auto-downloaded file with Adobe branding
Link to auto-downloaded file with Google Drive branding
Link to auto-download of a suspicious file type (unsolicited)
Low reputation link to auto-downloaded HTML file with smuggling indicators
macOS malware: Compiled AppleScript with document double-extension
MalwareBazaar: Malicious attachment hash in archive (trusted reporters)
MalwareBazaar: Malicious attachment hash (trusted reporters)
Malware: Pikabot delivery via URL auto-download
Non-RFC compliant calendar files from unsolicited sender
Open Redirect: Google domain with /url path and suspicious indicators