Callback scam: Impersonation via TimeTrade infrastructure
Canva design with suspicious embedded link
Canva infrastructure abuse
Catbox.moe link from untrusted source
ClickFunnels link infrastructure abuse
Cloud storage impersonation with credential theft indicators
Commonly abused sender TLD with engaging language
Compensation review with QR code in attached EML
Constant Contact link infrastructure abuse
COVID-19 themed fraud with sender and reply-to mismatch or compensation award
Credential phishing: Blue button styled link with file-sharing template artifacts
Credential phishing content and link (untrusted sender)
Credential phishing: DocuSign embedded image lure with no DocuSign domains in links
Credential phishing: Email delivery failure impersonation
Credential phishing: Engaging language and other indicators (untrusted sender)
Credential phishing: Fake card notification with tracking lure
Credential phishing: Fake password expiration from new and unsolicited sender
Credential phishing: Fake storage alerts (unsolicited)
Credential phishing: Financial lure via ActiveCampaign infrastructure
Credential phishing: Generic document share template
Credential phishing: Generic document sharing
Credential phishing: Hyper-linked image leading to free file host
Credential phishing language and suspicious indicators (unknown sender)
Credential phishing link (unknown sender)
Credential phishing: Onedrive impersonation
Credential phishing: Re-Authentication lure
Credential phishing: 'Secure message' and engaging language
Credential phishing: Suspicious e-sign agreement document notification
Credential phishing: Suspicious subject with urgent financial request and link
Credential phishing: Tax form impersonation with payment request
Credential Phishing via Dropbox comment abuse
Credential Phishing: W-2 lure with inline SVG Windows logo
Credential theft with 'safe content' deception and social engineering topics
Cyrillic vowel substitution in subject or display name from unknown sender
Cyrillic vowel substitutions with suspicious subject from unknown sender
Deceptive Dropbox mention
Display name and subject impersonation using recipient SLD (new sender)
Display Name Emoji with Financial Symbols
Display name impersonation using recipient SLD
Domain impersonation: Freemail reply-to local lookalike with financial request
EML attachment with credential theft language (unknown sender)
Employee impersonation: Payroll fraud
Employee impersonation with urgent request (untrusted sender)
Extortion / sextortion in attachment from untrusted sender
Extortion / Sextortion - PDF attachment leveraging breach data from freemail sender
Extortion / sextortion (untrusted sender)
Fake email quarantine notification
Fake message thread - Untrusted sender with a mismatched freemail reply-to address
Fake message thread with a suspicious link and engaging language from an unknown sender
Fake request for tax preparation