Adobe branded PDF file linking to a password-protected file from untrusted sender
Advance Fee Fraud (AFF) from freemail provider or suspicious TLD
Attachment: Adobe image lure in body or attachment with suspicious link
Attachment: Any HTML file (unsolicited)
Attachment: Any HTML file (untrusted sender)
Attachment: Any .sap file (unsolicited)
Attachment: Callback phishing solicitation via image file
Attachment: Callback phishing solicitation via pdf file
Attachment: Callback phishing solicitation via text-based file
Attachment: Compensation review lure with QR code
Attachment: Decoy PDF author (Julie P.)
Attachment: DocuSign impersonation via PDF linking to new domain
Attachment: Double base64-encoded zip file in HTML smuggling attachment
Attachment: Dropbox image lure with no Dropbox domains in links
Attachment: Embedded Javascript in SVG file
Attachment: Embedded VBScript in MHT file (unsolicited)
Attachment: EML containing a base64 encoded script
Attachment: EML file contains HTML attachment with login portal indicators
Attachment: EML file with HTML attachment (unsolicited)
Attachment: EML with embedded Javascript in SVG file
Attachment: EML with Sharepoint link likely unrelated to sender
Attachment: Emotet heavily padded doc in zip file
Attachment: Encrypted Microsoft Office file (unsolicited)
Attachment: Encrypted PDF with credential theft body
Attachment: Fake scan-to-email
Attachment: Fake secure message and suspicious indicators
Attachment: File execution via Javascript
Attachment: HTML attachment with login portal indicators
Attachment: HTML smuggling Microsoft sign in
Attachment: HTML smuggling - QR Code with suspicious links
Attachment: HTML smuggling with atob and high entropy
Attachment: HTML smuggling with atob and high entropy via calendar invite
Attachment: HTML smuggling with auto-downloaded file
Attachment: HTML smuggling with embedded base64-encoded ISO
Attachment: HTML with emoji-to-character map
Attachment: ICS calendar with embedded file from internal sender with SPF failure
Attachment: ICS with embedded Javascript in SVG file
Attachment: Microsoft 365 credential phishing
Attachment: Microsoft impersonation via PDF with link and suspicious language
Attachment: Office document with VSTO add-in
Attachment: OLE external relationship containing file scheme link to executable filetype
Attachment: OLE external relationship containing file scheme link to IP address
Attachment: PDF file with link to fake Bitcoin exchange
Attachment: PDF file with low reputation links to suspicious filetypes (unsolicited)
Attachment: PDF file with low reputation link to ZIP file (unsolicited)
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
Attachment: QR code link with base64-encoded recipient address
Attachment: QR code with credential phishing indicators
Attachment: QR code with userinfo portion