Hardbacon infrastructure abuse
Headers: Fake in-reply-to with wildcard sender and missing thread context
Headers: Invalid recipient domain with mismatched reply-to from new sender
Headers: iOS/iPadOS mailer with invalid build number
Headers: Outlook Express mailer
Headers: risky-recover-production message ID
Headers: Self-sender using Microsoft CompAuth bypass with credential theft content
Headers: System account impersonation with empty sender address
Headers: Zimbra mailer from a non-supported OS version
Honorific greeting BEC attempt with sender and reply-to mismatch
HR impersonation via e-sign agreement comment
Impersonation: Chrome Web Store policy
Impersonation: Executive using numbered local part
Impersonation: Human Resources with link or attachment and engaging language
Impersonation: Internal corporate services
Impersonation: Legal firm with copyright infringement notice
Impersonation: SharePoint reply header anomaly
Impersonation: Suspected supplier impersonation with suspicious content
Impersonation using recipient domain (untrusted sender)
Inbound message from popular service via newly observed distribution list
Invoicera infrastructure abuse
Job scam (unsolicited sender)
Job scam with specific salary pattern
Link abuse: Self-service creation platform link with suspicious recipient behavior
Link: Base64 encoded recipient address in URL fragment with subject hash
Link: Credential phishing link with undisclosed recipients
Link: Credential phishing traversing Russian infrastructure
Link: Credential phishing via WordPress
Link: Cryptocurrency fraud with suspicious links
Link: Direct link to riddle.com hosted showcase
Link: Direct link to Zoom Docs from non-Zoom sender
Link: Display text matches subject line
Link: Executable file download with suspicious message content
Link: File sharing impersonation with suspicious language and sending patterns
Link: Free file hosting with undisclosed recipients
Link: Free subdomain host with undisclosed recipients
Link: Intuit link abuse with file share context
Link: Microsoft protected message with matching sender and recipient addresses
Link: Multistage landing - Abused Adobe Acrobat hosted PDF
Link: Multistage landing - Ludus presentation
Link: .onion From Unsolicited Sender
Link: PDF filename impersonation with credential theft language
Link: Personalized URL with recipient address on commonly abused web service
Link: Personal SharePoint with invalid recipients and credential theft language
Link: Recipient domain in URL path
Link: Referrer anonymization service from untrusted sender
Link: Romance/Sexual Language With Suspicious Link
Link: Self-sender with sender org in subject and credential theft indicator
Link: Self-sent message with quarterly document review request
Link: SharePoint OneNote or PDF link with self sender behavior