Link: Shortened URL with fragment matching subject
Link: Single character path with credential theft body and self sender behavior or invalid recipient
Link: Squarespace infrastructure abuse
Link: Suspicious Sharepoint folder share
Link: Uncommon SharePoint document type with sender's display name
macOS malware: Compiled AppleScript with document double-extension
Mass campaign: Cross Site Scripting (XSS) attempt
Mass campaign: recipient address in subject, body, and link (untrusted sender)
Message traversed multiple onmicrosoft.com tenants
Microsoft infrastructure abuse with suspicious patterns
Newly registered sender or reply-to domain with newly registered linked domain
Observed IOC: Malicious sender domains
Observed IOC: Malicious sender email addresses
Observed IOC: Malicious sender root domains
Open redirect: giving.lluh.org
Open redirect (go2.aspx) leading to Microsoft credential phishing
Open Redirect: Google domain with /url path and suspicious indicators
Open redirect: marketing.edinburghairport.com
Open redirect: people.anuneo.com
Open redirect: queue.swytchbike.com
Open redirect: slubnaglowie.pl
Open redirect: Xfinity CMP Redirection to Google AMP
PHP Mailer with common phishing attachments
Potential prompt injection attack in body HTML
QR Code with suspicious indicators
Reconnaissance: All recipients cc/bcc'd or undisclosed
Reconnaissance: Email address harvesting attempt
Reconnaissance: Empty message from uncommon sender
Reconnaissance: Empty subject with mismatched reply-to from new sender
Reconnaissance: Hotel booking reply-to redirect
Reconnaissance: Large unknown recipient list
Reconnaissance: Short generic greeting message
Russia return-path TLD (untrusted sender)
Salesforce infrastructure abuse
Self-sender with copy/paste instructions and suspicious domains (French/Français)
Sendgrid onmicrosoft.com domain phishing
Service abuse: Adobe Creative Cloud share from an unsolicited sender address
Service abuse: Adobe legitimate domain with document approval language
Service abuse: Adobe Sign notification from an unsolicited reply-to address
Service Abuse: Box file sharing with credential phishing intent
Service abuse: Cisco secure email service with financial request
Service abuse: DocSend share from an unsolicited reply-to address
Service abuse: DocSend share from newly registered domain
Service abuse: DocuSign notification with suspicious sender or document name
Service abuse: DocuSign share from an unsolicited reply-to address
Service abuse: Domains By Proxy sender
Service abuse: Dropbox share from an unsolicited reply-to address