Link: Non-standard port 8443 in display URL
Link: Obfuscation via userinfo with excessive URL padding
Link: Obfuscation via userinfo with suspicious indicators
Link: .onion From Unsolicited Sender
Link: PDF display text with fake copyright claim template
Link: PDF filename impersonation with credential theft language
Link: QR code in EML attachment with credential phishing indicators
Link: Recipient email address in 'eta' parameter
Link: Referrer anonymization service from untrusted sender
Link: ScreenConnect installer with suspicious relay domain
Link: Scribd fullscreen link from suspicious sender
Link: Secure SharePoint file share from new or unusual sender
Link: Self-sender with sender org in subject and credential theft indicator
Link: Self-sent message with quarterly document review request
Link: SharePoint files shared from GoDaddy federated tenants
Link: SharePoint OneNote or PDF link with self sender behavior
Link: Shortened URL with fragment matching subject
Link: Single character path with credential theft body and self sender behavior or invalid recipient
Link: Spam website with evasion indicators
Link: Suspicious go.php redirect with document lure
Link: Suspicious SharePoint document name
Link: Suspicious Sharepoint folder share
Link: Suspicious URL with recipient targeting and special characters
Link to a domain with punycode characters
Link to auto-downloaded disk image in encrypted zip
Link to auto-downloaded DMG in archive
Link to auto-downloaded DMG in encrypted zip
Link to auto-download of a suspicious file type (unsolicited)
Link: Tycoon2FA phishing kit (non-exhaustive)
Link: Unsolicited email contains link leading to Tycoon URL structure
Link: Unsolicited email contains link to page containing Tycoon URI structure
Link: URL fragment with hexadecimal pattern obfuscation
Link: URL path containing /moni/index
Link: URL redirecting to blob URL
Link: URL scheme obfuscation via split HTML anchors
Link: URL shortener with copy-paste instructions and credential theft language
Link: WordPress admin targeting with recipient identifier in URL fragment
Low reputation link to auto-downloaded HTML file with smuggling indicators
macOS malware: Compiled AppleScript with document double-extension
MalwareBazaar: Malicious attachment hash in archive (trusted reporters)
Malware: Pikabot delivery via URL auto-download
Message traversed multiple onmicrosoft.com tenants
Microsoft infrastructure abuse with suspicious patterns
Non-RFC compliant calendar files from unsolicited sender
Notion suspicious file share
Observed IOC: Malicious domains in body links
Observed IOC: Malicious root domains in body links
Observed IOC: Malicious URLs in body links
Open redirect: Cartoon Network