Abuse: Cloudflare Workers Hosted EvilTokens Domain Structure
Advance Fee Fraud (AFF) from freemail provider or suspicious TLD
Attachment: Archive containing HTML file with file scheme link
Attachment: Calendar invite from recently registered domain
Attachment: Calendar invite with Google redirect and invoice request
Attachment: Callback phishing solicitation via image file
Attachment: Callback phishing solicitation via pdf file
Attachment: Callback phishing solicitation via text-based file
Attachment: Cold outreach with invitation subject and not attachment
Attachment: Compensation review lure with QR code
Attachment: Credit card application with WhatsApp contact
Attachment: DocuSign impersonation via PDF linking to new domain
Attachment: DOCX with hyperlink targeting recipient address
Attachment: Dropbox image lure with no Dropbox domains in links
Attachment: EML containing a base64 encoded script
Attachment: EML with link to credential phishing page
Attachment: EML with SharePoint files shared from GoDaddy federated tenants
Attachment: EML with Sharepoint link likely unrelated to sender
Attachment: EML with suspicious indicators
Attachment: Employment contract update with suspicious file naming
Attachment: Encrypted PDF with credential theft body
Attachment: Encrypted zip file with payment-related lure
Attachment: Excel file with document sharing lure created by Go Excelize
Attachment: Fake attachment image lure
Attachment: Fake lawyer & sports agent identities
Attachment: Fake scan-to-email
Attachment: Fake secure message and suspicious indicators
Attachment: Fake Slack installer
Attachment: Fake voicemail via PDF
Attachment: Fake Zoom installer
Attachment: Fictitious invoice using LinkedIn's address
Attachment: HTML smuggling Microsoft sign in
Attachment: HTML smuggling with embedded base64 streamed file download
Attachment: HTML smuggling with excessive string concatenation and suspicious patterns
Attachment: HTML with emoji-to-character map
Attachment: ICS calendar file with QR code containing recipient email address
Attachment: ICS calendar file with recipient address in UID field
Attachment: ICS file with links to newly registered domains
Attachment: ICS file with meeting prefix
Attachment: ICS with employee policy review lure
Attachment: Invoice and W-9 PDFs with suspicious creators
Attachment: Legal themed message or PDF with suspicious indicators
Attachment: Link to Doubleclick.net open redirect
Attachment: Microsoft 365 credential phishing
Attachment: Microsoft impersonation via PDF with link and suspicious language
Attachment: Office file contains OLE relationship to credential phishing page
Attachment: Office file with credential phishing URLs
Attachment: Office file with document sharing and browser instruction lures
Attachment: PDF bid/proposal lure with credential theft indicators
Attachment: PDF contains W9 or invoice YARA signatures