Link: MyActiveCampaign Link Abuse
Link: Non-standard port 8443 in display URL
Link: Obfuscation via userinfo with excessive URL padding
Link: Obfuscation via userinfo with suspicious indicators
Link: .onion From Unsolicited Sender
Link: PDF and financial display text to free file host
Link: PDF filename impersonation with credential theft language
Link: Personalized URL with recipient address on commonly abused web service
Link: Personal SharePoint with invalid recipients and credential theft language
Link: QR code with phishing disposition in img or pdf
Link: QR Code with suspicious language (untrusted sender)
Link: QuickBooks image lure with suspicious link
Link: Recipient domain in URL path
Link: Recipient email address in 'eta' parameter
Link: Referrer anonymization service from untrusted sender
Link: RFI document reference pattern in display text
Link: Romance/Sexual Language With Suspicious Link
Link: ScreenConnect installer with suspicious relay domain
Link: Scribd fullscreen link from suspicious sender
Link: Self-sender with sender org in subject and credential theft indicator
Link: Self-sent message with quarterly document review request
Link: SharePoint filename matches org name
Link: SharePoint files shared from GoDaddy federated tenants
Link: SharePoint OneNote or PDF link with self sender behavior
Link: Shortened URL with fragment matching subject
Link: Single character path with credential theft body and self sender behavior or invalid recipient
Link: Spam website with evasion indicators
Link: Squarespace infrastructure abuse
Link: Suspicious go.php redirect with document lure
Link: Suspicious Sharepoint folder share
Link: Suspicious URL with recipient targeting and special characters
Link: Tax document lure Portuguese/Spanish with suspicious domains
Link to a domain with punycode characters
Link to auto-downloaded disk image in encrypted zip
Link to auto-downloaded DMG in archive
Link to auto-downloaded DMG in encrypted zip
Link to auto-downloaded file with Adobe branding
Link to auto-downloaded file with Google Drive branding
Link to auto-download of a suspicious file type (unsolicited)
Link to Google Apps Script macro (unsolicited)
Link to Google Apps Script macro via comment tagging
Link: Tycoon2FA phishing kit (non-exhaustive)
Link: Uncommon SharePoint document type with sender's display name
Link: Unsolicited email contains link leading to Tycoon URL structure
Link: Unsolicited email contains link to page containing Tycoon URI structure
Link: URL fragment with hexadecimal pattern obfuscation
Link: URL path containing /moni/index
Link: URL redirecting to blob URL
Link: URL scheme obfuscation via split HTML anchors
Link: URL shortener with copy-paste instructions and credential theft language