Advance Fee Fraud (AFF) from freemail provider or suspicious TLD
Anthropic Magic String in HTML
Attachment: Adobe image lure in body or attachment with suspicious link
Attachment: Callback phishing solicitation via pdf file
Attachment: EML containing a base64 encoded script
Attachment: EML file contains HTML attachment with login portal indicators
Attachment: EML file with HTML attachment (unsolicited)
Attachment: EML with link to credential phishing page
Attachment: EML with Sharepoint link likely unrelated to sender
Attachment: EML with suspicious indicators
Attachment: Fake attachment image lure
BEC/Fraud: Job scam fake thread or plaintext pivot to freemail
BEC/Fraud: Student loan callback phishing
Body: Embedded email headers indicative of thread hijacking/abuse
Body HTML: Comment with 24-character hex token
Body HTML: Recipient SLD in HTML class
Brand impersonation: Adobe Sign with suspicious indicators
Brand impersonation: Booking.com
Brand impersonation: Capital One
Brand impersonation: DocuSign
Brand impersonation: Dropbox
Brand impersonation: Evite
Brand impersonation: Fake DocuSign HTML table not linking to DocuSign domains
Brand impersonation: Fake Fax
Brand impersonation: File sharing notification with template artifacts
Brand impersonation: Google Drive fake file share
Brand impersonation: Google Meet with malicious link
Brand impersonation: Google using Microsoft Forms
Brand impersonation: Google Workspace alert notification
Brand impersonation: Greenvelope
Brand impersonation: Mailgun
Brand impersonation: Microsoft logo in HTML with fake quarantine release notification
Brand impersonation: Microsoft (QR code)
Brand impersonation: Microsoft Teams invitation
Brand impersonation: Microsoft with low reputation links
Brand impersonation: Paperless Post
Brand impersonation: Punchbowl
Brand impersonation: QuickBooks notification from Intuit themed company name
Brand impersonation: Sharepoint
Brand impersonation: Sharepoint fake file share
Brand impersonation: SharePoint PDF attachment with credential theft language
Brand impersonation: UK government Home Office
Brand impersonation: USPS
Brand impersonation: Wells Fargo
Brand impersonation: Zoom
Brand impersonation: Zoom via HTML styling
Callback phishing: AOL senders with suspicious HTML template or PDF attachment
Callback phishing in body or attachment (untrusted sender)
Callback phishing: SumUp infrastructure abuse
Callback phishing via Apple ID display name abuse