Impersonation: Suspected supplier impersonation with suspicious content
Inbound message from popular service via newly observed distribution list
Inline image as message with attachment or link
Issuu document with suspicious embedded link
Link: 9WOLF phishkit initial landing URI
Link: Abused Adobe Express
Link: Adobe share from unsolicited sender
Link: Adobe share with suspicious indicators
Link: Apple App Store malicious ad manager themed apps from free email provider
Link: Apple TestFlight from suspicious sender
Link: Base64 encoded recipient address in URL fragment with hex subdomain
Link: Base64 encoded recipient address in URL fragment with subject hash
Link: Common hidden directory observed
Link: Commonly Abused Web Service redirecting to ZIP file
Link: Credential phishing link with undisclosed recipients
Link: Credential theft with invisible Unicode character in page title from unsolicited sender
Link: Cryptocurrency fraud with suspicious links
Link: CVE-2024-21413 Microsoft Outlook Remote Code Execution Vulnerability
Link: Direct download of executable file
Link: Direct link to gamma.app document with mode parameter
Link: Direct link to keap.app contact-us page
Link: Direct MSI download from low reputation domain
Link: Display text matches subject line
Link: Display text with excessive right-to-left mark characters
Link: Excessive URL rewrite encoders
Link: Executable file download with suspicious message content
Link: Figma design deck with credential theft language
Link: File sharing pretext with suspicious body and link
Link: Flagged bit.ly link
Link: Free file hosting with undisclosed recipients
Link: Google Firebase dynamic link that redirects to new domain (<7 days old)
Link: GoPhish query param values
Link: Hotel booking spoofed display URL
Link: HTML file with suspicious binary fragment ending pattern
Link: IPv4-mapped IPv6 address obfuscation
Link: JavaScript obfuscation with Telegram bot integration
Link: Landing page with search-ms protocol redirect
Link: Mamba 2FA phishing kit
Link: Microsoft device code authentication with suspicious indicators
Link: Microsoft Dynamics 365 form phishing
Link: Microsoft protected message with matching sender and recipient addresses
Link: Mixed case HTTPS protocol
Link: Multiple HTTP protocols in single URL
Link: Multistage landing - Abused Adobe frame.io
Link: Multistage landing - Abused Docusign
Link: Multistage landing - Abused Google Drive
Link: Multistage landing - ClickUp abuse
Link: Multistage landing - JotForm abuse
Link: Multistage landing - Ludus presentation
Link: Multistage landing - Scribd document