Link: Microsoft protected message with matching sender and recipient addresses
Link: Multistage landing - Abused Adobe Acrobat hosted PDF
Link: Multistage landing - Abused Docusign
Link: Multistage landing - Abused Google Drive
Link: Multistage landing - Ludus presentation
Link: Multistage landing - Trello board abuse
Link: MyActiveCampaign Link Abuse
Link: .onion From Unsolicited Sender
Link: PDF and financial display text to free file host
Link: PDF filename impersonation with credential theft language
Link: QR code with phishing disposition in img or pdf
Link: QR Code with suspicious language (untrusted sender)
Link: Recipient domain in URL path
Link: Referrer anonymization service from untrusted sender
Link: Scribd fullscreen link from suspicious sender
Link: Secure SharePoint file share from new or unusual sender
Link: Self-sender with sender org in subject and credential theft indicator
Link: Self-sent message with quarterly document review request
Link: SharePoint files shared from GoDaddy federated tenants
Link: SharePoint OneNote or PDF link with self sender behavior
Link: Single character path with credential theft body and self sender behavior or invalid recipient
Link: Squarespace infrastructure abuse
Link: Suspicious Sharepoint folder share
Link to a domain with punycode characters
Link to auto-downloaded disk image in encrypted zip
Link to auto-downloaded DMG in archive
Link to auto-downloaded DMG in encrypted zip
Link to auto-downloaded file with Adobe branding
Link to auto-download of a suspicious file type (unsolicited)
Link to Google Apps Script macro (unsolicited)
Link to Google Apps Script macro via comment tagging
Link: Unsolicited email contains link to page containing Tycoon URI structure
Link: URL redirecting to blob URL
Link: Webflow link from unsolicited sender
Link: Zoho form link from unsolicited sender
Lookalike sender domain (untrusted sender)
Low reputation link to auto-downloaded HTML file with smuggling indicators
MalwareBazaar: Malicious attachment hash in archive (trusted reporters)
MalwareBazaar: Malicious attachment hash (trusted reporters)
Mass campaign: Cross Site Scripting (XSS) attempt
Mass campaign: recipient address in subject, body, and link (untrusted sender)
Message traversed multiple onmicrosoft.com tenants
Microsoft device code phishing
Microsoft infrastructure abuse with suspicious patterns
Mismatched links: Free file share with urgent language
New link domain (<=10d) from untrusted sender
New sender domain (<=10d) from untrusted sender
Non-RFC compliant calendar files from unsolicited sender
Notion suspicious file share
Observed IOC: Malicious sender domains