Link: HR impersonation with suspicious domain indicators and credential theft
Link: Intuit link abuse with file share context
Link: Microsoft Dynamics 365 form phishing
Link: Microsoft impersonation using hosted png with suspicious link
Link: Multistage Landing - Abused Buildin.ai
Link: Multistage landing - FreshDesk knowledge base abuse
Link: Multistage landing - Ludus presentation
Link: Multistage landing - Published Google Doc
Link: Multistage landing - Scribd document
Link: MyActiveCampaign Link Abuse
Link: PDF filename impersonation with credential theft language
Link: Personal SharePoint with invalid recipients and credential theft language
Link: QR Code with suspicious language (untrusted sender)
Link: Self-sender with sender org in subject and credential theft indicator
Link: Single character path with credential theft body and self sender behavior or invalid recipient
Link: Unsolicited email contains link leading to Tycoon URL structure
Link: URL shortener with copy-paste instructions and credential theft language
Mass campaign: recipient address in subject, body, and link (untrusted sender)
Mismatched links: Free file share with urgent language
Open Redirect: Google domain with /url path and suspicious indicators
QR Code with suspicious indicators
Reconnaissance: Short generic greeting message
Recruitee Infrastructure Abuse
Request for Quote or Purchase (RFQ|RFP) with HTML smuggling attachment
Request for Quote or Purchase (RFQ|RFP) with suspicious sender or recipient pattern
Salesforce infrastructure abuse
Service abuse: Apple TestFlight with suspicious developer reference
Service abuse: AppSheet infrastructure with suspicious indicators
Service abuse: AWS SNS callback scam impersonation
Service Abuse: Box file sharing with credential phishing intent
Service abuse: Cisco secure email service with financial request
Service abuse: FlipHTML5 with attachment deception and credential theft language
Service abuse: GetAccept callback scam content
Service Abuse: GoDaddy infrastructure
Service abuse: Google Calendar notification with callback scam language
Service abuse: Google Firebase sender address with suspicious content
Service abuse: Microsoft Power Apps callback scam
Service abuse: Microsoft Power Automate callback scam impersonation
Service abuse: Microsoft Power BI callback scam
Service abuse: Monday.com callback scam
Service abuse: Nylas tracking subdomain with suspicious content
Service abuse: Recruiting with suspicious language patterns from legitimate platforms
Service abuse: Roomsy with unrelated body content
Service abuse: Sendgrid credential theft with personalized request targeting single recipient
Service abuse: SendThisFile with credential theft and financial language
Service abuse: Substack credential theft with confusable characters and branded button redirects
Service abuse: WeTransfer callback scam
Spam: Fake dating profile notification
Spam/fraud: Predatory journal/research paper request