Service abuse: Recruiting with suspicious language patterns from legitimate platforms
Service abuse: Roomsy with unrelated body content
Service abuse: Sendgrid credential theft with personalized request targeting single recipient
Service abuse: SendGrid-formatted link with actor-controlled fragment
Service abuse: SendGrid impersonation via Sendgrid from new sender
Service abuse: SendThisFile with credential theft and financial language
Service abuse: Substack credential theft with confusable characters and branded button redirects
Service abuse: SurveyMonkey survey from newly registered domain
Service abuse: Suspicious Zoom Docs link
Service abuse: Task management message sent via SendGrid
Service abuse: Trello board invitation with VIP impersonation
Service abuse: Vimeo with external plain-text links in message
Service abuse: WeTransfer callback scam
Sharepoint link likely unrelated to sender
SharePoint OTP for filename matching org name
Shopify infrastructure abuse
Spam: BlackBaud infrastructure abuse
Spam: Commonly observed formatting of unauthorized free giveaways
Spam: Cryptocurrency airdrop/giveaway
Spam: Default Microsoft Exchange Online sender domain (onmicrosoft.com)
Spam: Fake dating profile notification
Spam: Firebase password reset from suspicious sender
Spam/fraud: Predatory journal/research paper request
Spam: Ghostwriting services scam with manipulative language
Spam: Mastercard promotional content with image-based body
Spam: Personalized subject and greetings via Salesforce Marketing Cloud
Spam: Sendersrv.com with financial communications and unsubscribe language
Spam: Sexually explicit content with emoji in subject from freemail provider
Spam: Sexually explicit Google Drive share
Spam: Sexually explicit Google group invitation
Spam: Sexually explicit Looker Studio report
Spam: Single recipient duplicated in cc
Spam: Unsolicited WordPress account creation or password reset request
Spoofable internal domain with suspicious signals
Subject and sender display name contains matching long alphanumeric string
Suspected lookalike domain with suspicious language
Suspected WordPress abuse with cross-site scripting (XSS) indicators
Suspicious attachment with unscannable Cloudflare link
Suspicious display name: Gmail sender with engaging language
Suspicious DocuSign share from new domain
Suspicious invoice reference with missing or image-only attachments
Suspicious link to Looker Studio (lookerstudio.google.com) from a new and unsolicited sender
Suspicious mailer received from Gmail servers
Suspicious newly registered reply-to domain with engaging financial or urgent language
Suspicious recipient pattern and language with low reputation link to login
Suspicious request for financial information
Targeting: Specific AOL address
Tax Form: W-8BEN solicitation
Truth Social infrastructure abuse via link redirect