Abuse: Cloudflare Workers Hosted EvilTokens Domain Structure
Attachment: Adobe image lure in body or attachment with suspicious link
Attachment: Calendar invite with Google redirect and invoice request
Attachment: Calendar invite with suspicious link leading to an open redirect
Attachment: Callback phishing solicitation via image file
Attachment: DocuSign impersonation via PDF linking to new domain
Attachment: EML file with IPFS links
Attachment: EML with link to credential phishing page
Attachment: EML with QR code redirecting to Cloudflare challenges
Attachment: EML with SharePoint files shared from GoDaddy federated tenants
Attachment: EML with Sharepoint link likely unrelated to sender
Attachment: Fake Slack installer
Attachment: Fake voicemail via PDF
Attachment: Fake Zoom installer
Attachment: HTML smuggling 'body onload' linking to suspicious destination
Attachment: HTML smuggling Microsoft sign in
Attachment: HTML smuggling - QR Code with suspicious links
Attachment: HTML smuggling with atob and high entropy
Attachment: HTML smuggling with auto-downloaded file
Attachment: ICS calendar file with QR code containing recipient email address
Attachment: ICS file with AWS Lambda URL
Attachment: ICS file with links to newly registered domains
Attachment: Legal themed message or PDF with suspicious indicators
Attachment: Link to Doubleclick.net open redirect
Attachment: Office document loads remote document template
Attachment: Office document with VSTO add-in
Attachment: Office file contains OLE relationship to credential phishing page
Attachment: Office file with credential phishing URLs
Attachment: PDF bid/proposal lure with credential theft indicators
Attachment: PDF file with link to fake Bitcoin exchange
Attachment: PDF file with low reputation link to ZIP file (unsolicited)
Attachment: PDF proposal with credential theft indicators
Attachment: PDF with a suspicious string and single URL
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
Attachment: PDF with link to DMG file download
Attachment: PDF with link to zip containing a wsf file
Attachment: PDF with multistage landing - ClickUp abuse
Attachment: PDF with recipient email in link
Attachment: PDF with suspicious language and redirect to suspicious file type
Attachment: PDF with suspicious link and action-oriented language
Attachment: QR code with credential phishing indicators
Attachment: QR code with encoded recipient targeting and redirect indicators
Attachment: QR code with recipient targeting and special characters
Attachment: QR code with suspicious URL patterns in EML file
Attachment: RTF file with suspicious link
Attachment: Small text file with link containing recipient email address
Brand impersonation: AliExpress
Brand impersonation: Chase bank with credential phishing indicators
Brand impersonation: Coinbase with suspicious links
Brand impersonation: DocuSign