Link: Direct POWR.io Form Builder with suspicious patterns
Link: Display text matches subject line
Link: Display text with excessive right-to-left mark characters
Link: Excessive URL rewrite encoders
Link: Executable file download with suspicious message content
Link: Figma design deck with credential theft language
Link: File sharing impersonation with suspicious language and sending patterns
Link: File sharing pretext with suspicious body and link
Link: Financial account issue with suspicious indicators
Link: Flagged bit.ly link
Link: Free file hosting with undisclosed recipients
Link: Free subdomain host with undisclosed recipients
Link: Google Calendar invite linking to an open redirect from an untrusted freemail sender
Link: Google Drawings link from new sender
Link: Google Firebase dynamic link that redirects to new domain (<7 days old)
Link: Google Forms link with credential theft language
Link: Google Translate (unsolicited)
Link: GoPhish query param values
Link: Hotel booking spoofed display URL
Link: HR impersonation with suspicious domain indicators and credential theft
Link: HTML file with suspicious binary fragment ending pattern
Link: /index.php enclosed in three asterisks
Link: Intuit link abuse with file share context
Link: Invoice or receipt from freemail sender with customer service number
Link: IPv4-mapped IPv6 address obfuscation
Link: JavaScript obfuscation with Telegram bot integration
Link: Jensi file preview link from unsolicited sender
Link: Job recruitment lure from unsolicited sender with suspicious hosting
Link: Landing page with search-ms protocol redirect
Link: Mamba 2FA phishing kit
Link: Microsoft device code authentication with suspicious indicators
Link: Microsoft Dynamics 365 form phishing
Link: Microsoft impersonation using hosted png with suspicious link
Link: Microsoft protected message with matching sender and recipient addresses
Link: Mixed case HTTPS protocol
Link: Multiple HTTP protocols in single URL
Link: Multistage landing - Abused Adobe Acrobat hosted PDF
Link: Multistage landing - Abused Adobe frame.io
Link: Multistage Landing - Abused Buildin.ai
Link: Multistage landing - Abused Docusign
Link: Multistage landing - Abused Google Drive
Link: Multistage landing - ClickUp abuse
Link: Multistage landing - FreshDesk knowledge base abuse
Link: Multistage landing - JotForm abuse
Link: Multistage landing - Ludus presentation
Link: Multistage landing - Microsoft Forms abuse
Link: Multistage landing - Published Google Doc
Link: Multistage landing - Scribd document
Link: Multistage landing - Trello board abuse