Attachment: PDF proposal with credential theft indicators
Attachment: PDF with a suspicious string and single URL
Attachment: PDF with JSFck obfuscation
Attachment: PDF with link to DMG file download
Attachment: PDF with link to zip containing a wsf file
Attachment: PDF with multistage landing - ClickUp abuse
Attachment: PDF with password in filename matching body text
Attachment: PDF with ReportLab library and default metadata
Attachment: PDF with split QR code
Attachment: PDF with suspicious HeadlessChrome metadata
Attachment: PDF with suspicious language and redirect to suspicious file type
Attachment: PDF with suspicious link and action-oriented language
Attachment: PDF with suspicious view document characteristics
Attachment: Potential sandbox evasion in Office file
Attachment: PowerPoint with suspicious hyperlink
Attachment: QR code link with base64-encoded recipient address
Attachment: QR code with encoded recipient targeting and redirect indicators
Attachment: QR code with recipient targeting and special characters
Attachment: QR code with suspicious URL patterns in EML file
Attachment: QR code with userinfo portion
Attachment: RFC822 containing suspicious file sharing language with links from untrusted sender
Attachment: RTF file with suspicious link
Attachment: RTF with embedded content
Attachment: Self-sender PDF with minimal content and view prompt
Attachment: SFX archive containing commands
Attachment: Small text file with link containing recipient email address
Attachment: Suspicious employee policy update document lure
Attachment: Suspicious PDF created with headless browser
Attachment: SVG files with evasion elements
Attachment: TAR file with RAR type
Attachment: Web files with suspicious comments
Attachment: WinRAR CVE-2025-8088 exploitation
Attachment with encrypted zip (unsolicited)
Attachment with macro calling executable
Attachment with unscannable encrypted zip (unsolicited)
Attachment: XLSX file with suspicious print titles metadata
Attachment: ZIP file with CVE-2026-0866 exploit
BEC/Fraud: Reply-chain manipulation with urgent keywords and self-reply
BEC with unusual reply-to or return-path mismatch
Benefits enrollment impersonation
Body: Embedded email headers indicative of thread hijacking/abuse
Body HTML: Comment with 24-character hex token
Body HTML: Recipient SLD in HTML class
Body: Suspicious date format
Brand impersonation: Coinbase with suspicious links
Brand impersonation: DocuSign with embedded QR code
Brand impersonation: File sharing notification with template artifacts
Brand impersonation: Microsoft logo in HTML with fake quarantine release notification
Brand impersonation: Microsoft Planner with suspicious link
Brand impersonation: QuickBooks notification from Intuit themed company name