Adobe branded PDF file linking to a password-protected file from untrusted sender
Attachment: Archive with pdf, txt and wsf files
Attachment: Callback phishing solicitation via pdf file
Attachment: Compensation review lure with QR code
Attachment: Decoy PDF author (Julie P.)
Attachment: DocuSign impersonation via PDF linking to new domain
Attachment: Encrypted PDF with credential theft body
Attachment: Fake scan-to-email
Attachment: Fake voicemail via PDF
Attachment: Fictitious invoice using LinkedIn's address
Attachment: Finance themed PDF with observed phishing template
Attachment: Invoice and W-9 PDFs with suspicious creators
Attachment: Legal themed message or PDF with suspicious indicators
Attachment: Microsoft impersonation via PDF with link and suspicious language
Attachment: Password-protected PDF with fake document indicators
Attachment: PDF bid/proposal lure with credential theft indicators
Attachment: PDF contains W9 or invoice YARA signatures
Attachment: PDF file with link to fake Bitcoin exchange
Attachment: PDF file with low reputation links to suspicious filetypes (unsolicited)
Attachment: PDF file with low reputation link to ZIP file (unsolicited)
Attachment: PDF generated with wkhtmltopdf tool and default title
Attachment: PDF Object Hash - Encrypted PDFs with fake payment notification
Attachment: PDF proposal with credential theft indicators
Attachment: PDF with a suspicious string and single URL
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
Attachment: PDF with link to DMG file download
Attachment: PDF with link to zip containing a wsf file
Attachment: PDF with Microsoft Purview message impersonation
Attachment: PDF with multistage landing - ClickUp abuse
Attachment: PDF with password in filename matching body text
Attachment: PDF with personal Microsoft OneNote URL
Attachment: PDF with recipient email in link
Attachment: PDF with ReportLab library and default metadata
Attachment: PDF with suspicious HeadlessChrome metadata
Attachment: PDF with suspicious language and redirect to suspicious file type
Attachment: PDF with suspicious link and action-oriented language
Attachment: QR code link with base64-encoded recipient address
Attachment: QR code with userinfo portion
Attachment: RFP/RFQ impersonating government entities
Attachment: Self-sender PDF with minimal content and view prompt
Attachment: Soda PDF producer with encryption themes
Attachment: Suspicious employee policy update document lure
Attachment: Suspicious PDF created with headless browser
Attachment: USDA bid invitation impersonation
Brand impersonation: Adobe (QR code)
Brand impersonation: DocuSign PDF attachment with suspicious link
Brand impersonation: DocuSign (QR code)
Brand Impersonation: Google (QR Code)
Brand impersonation: Microsoft (QR code)
Brand impersonation: SharePoint PDF attachment with credential theft language