Open redirect: tuttocauzioni.it
Open redirect: typedrawers.com
Open redirect: unitedwaynwvt.org
Open redirect: vconfex.com
Open redirect: weblinkconnect.com
Open redirect: whitefox.pl
Open redirect: Xfinity CMP Redirection to Google AMP
Open redirect: xfinity.com
Open redirect: YouTube --> Google Redirection Chain
QR code to auto-download of a suspicious file type (unsolicited)
QR Code with suspicious indicators
Reconnaissance: All recipients cc/bcc'd or undisclosed
Reconnaissance: Email address harvesting attempt
Reconnaissance: Empty subject with mismatched reply-to from new sender
Reconnaissance: Hotel booking reply-to redirect
Reconnaissance: Large unknown recipient list
Reconnaissance: Short generic greeting message
Recruitee Infrastructure Abuse
Russia return-path TLD (untrusted sender)
Self-sender with copy/paste instructions and suspicious domains (French/Français)
Self-sent fake PDF attachment with misleading link
Sender: IP address in local part
Sender name contains Active Directory distinguished name
Service abuse: Adobe Creative Cloud share from an unsolicited sender address
Service abuse: Adobe legitimate domain with document approval language
Service abuse: Adobe Sign notification from an unsolicited reply-to address
Service abuse: Apple TestFlight with suspicious developer reference
Service abuse: AWS SNS callback scam impersonation
Service Abuse: Box file sharing with credential phishing intent
Service abuse: Callback phishing via Microsoft Teams invite
Service abuse: Cisco secure email service with financial request
Service abuse: DocSend share from an unsolicited reply-to address
Service abuse: DocSend share from newly registered domain
Service abuse: DocuSign notification with suspicious sender or document name
Service abuse: DocuSign share from an unsolicited reply-to address
Service abuse: Domains By Proxy sender
Service abuse: Dropbox share from an unsolicited reply-to address
Service abuse: Dropbox share from new domain
Service abuse: Dropbox share with suspicious sender or document name
Service Abuse: ExactTarget with suspicious sender indicators
Service abuse: Facebook business with action required subject
Service abuse: File sharing impersonation with external SharePoint links
Service abuse: Free provider with SendGrid routing
Service abuse: GetAccept callback scam content