Attachment: PDF file with link to fake Bitcoin exchange
Attachment: PDF proposal with credential theft indicators
Attachment: PDF with a suspicious string and single URL
Attachment: PDF with credential theft language and invalid reply-to domain
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
Attachment: PDF with Microsoft Purview message impersonation
Attachment: PDF with multistage landing - ClickUp abuse
Attachment: PDF with personal Microsoft OneNote URL
Attachment: PDF with recipient email in link
Attachment: PDF with suspicious link and action-oriented language
Attachment: PDF with suspicious view document characteristics
Attachment: QR code link with base64-encoded recipient address
Attachment: QR code with credential phishing indicators
Attachment: QR code with recipient targeting and special characters
Attachment: QR code with suspicious URL patterns in EML file
Attachment: RFC822 containing suspicious file sharing language with links from untrusted sender
Attachment: RFP/RFQ impersonating government entities
Attachment: Self-sender PDF with minimal content and view prompt
Attachment: Small text file with link containing recipient email address
Attachment: Soda PDF producer with encryption themes
Attachment: Suspicious employee policy update document lure
Attachment: USDA bid invitation impersonation
Attachment with VBA macros from employee impersonation (unsolicited)
BEC: Employee impersonation with subject manipulation
BEC/Fraud: Generic scam attempt to undisclosed recipients
BEC/Fraud: Reply-chain manipulation with urgent keywords and self-reply
BEC/Fraud: Student loan callback phishing
BEC/Fraud: Urgent language and suspicious sending/infrastructure patterns
BEC with unusual reply-to or return-path mismatch
Benefits enrollment impersonation
Body: Embedded email headers indicative of thread hijacking/abuse
Body HTML: Recipient SLD in HTML class
Body: PayApp transaction reference pattern
Body: Suspicious date format
Brand impersonation: AARP
Brand impersonation: Adobe Sign with suspicious indicators
Brand impersonation: Adobe with suspicious language and link
Brand impersonation: AliExpress
Brand impersonation: Amazon
Brand impersonation: Amazon Web Services (AWS)
Brand impersonation: Amazon with suspicious attachment
Brand impersonation: American Express (AMEX)
Brand impersonation: Apple
Brand impersonation: Aquent
Brand impersonation: Aramco
Brand impersonation: AuthentiSign
Brand impersonation: Bank of America