Link: Suspicious go.php redirect with document lure
Link: Suspicious URL with recipient targeting and special characters
Link: Tax document lure Portuguese/Spanish with suspicious domains
Link to auto-downloaded disk image in encrypted zip
Link to auto-downloaded DMG in encrypted zip
Link to auto-downloaded file with Adobe branding
Link to auto-downloaded file with Google Drive branding
Link to auto-download of a suspicious file type (unsolicited)
Link to Google Apps Script macro (unsolicited)
Link to Google Apps Script macro via comment tagging
Link: Uncommon SharePoint document type with sender's display name
Link: Unsolicited email contains link leading to Tycoon URL structure
Link: Unsolicited email contains link to page containing Tycoon URI structure
Link: URL scheme obfuscation via split HTML anchors
Link: URL shortener with copy-paste instructions and credential theft language
Link: WordPress admin targeting with recipient identifier in URL fragment
Link: WordPress login page with Blogspot Binance scam
Lookalike sender domain (untrusted sender)
Low reputation link to auto-downloaded HTML file with smuggling indicators
macOS malware: Compiled AppleScript with document double-extension
Mass campaign: Cross Site Scripting (XSS) attempt
Mass campaign: recipient address in subject, body, and link (untrusted sender)
Microsoft device code phishing
Microsoft infrastructure abuse with suspicious patterns
Mismatched links: Free file share with urgent language
Newly registered sender or reply-to domain with newly registered linked domain
Non-RFC compliant calendar files from unsolicited sender
Observed IOC: Malicious domains in body links
Observed IOC: Malicious root domains in body links
Observed IOC: Malicious sender domains
Observed IOC: Malicious sender email addresses
Observed IOC: Malicious sender root domains
Observed IOC: Malicious URLs in body links
Open redirect: City of Calgary
Open redirect: giving.lluh.org
Open redirect: marketing.edinburghairport.com
Open redirect: people.anuneo.com
Open redirect: queue.swytchbike.com
Open redirect: slubnaglowie.pl
Open redirect: typedrawers.com
Potential prompt injection attack in body HTML
QR code to auto-download of a suspicious file type (unsolicited)
QR Code with suspicious indicators
Reconnaissance: Email address harvesting attempt
Reconnaissance: Empty message from uncommon sender
Reconnaissance: Empty subject with mismatched reply-to from new sender