Attack Library
Citibank Impersonators Send Fake Account Update Alert from Spoofed Address in Credential Phishing Attempt
Attackers mimic Citibank security alerts to trick users into visiting a fake login page and divulging sensitive information.
Attackers Impersonate Coinbase and Send Fake Binance Payment Notification in Cryptocurrency Scam
Claiming the recipient has passively earned thousands of dollars in Bitcoin, threat actors attempt to deceive them into visiting a malicious credential-harvesting site.
Adaptive Phishing Attack Uses Whimsical and Lucid to Deliver Microsoft 365 Credential Phish
A phishing campaign uses a trusted vendor account and design platforms Whimsical and Lucid to deliver a fake Microsoft 365 login and steal user credentials.
Phishers Send Fake Adobe Acrobat Notification to Attempt Credential Theft
Attackers impersonate Adobe and use urgency around a time-sensitive document to trick employees into visiting a malicious site.
Fake FedEx Address Verification Email Uses QR Code to Steal Personal Data in Likely AI-Generated Attack
Phishers attempt to steal personal information by impersonating FedEx and sending targets a PDF containing a QR code linked to a malicious site.
Phishers Send Fake Microsoft 365 Account Verification Request in Likely AI-Generated Attack
Threat actors send fraudulent notification regarding Microsoft 365 updates to deceive targets into revealing account credentials.
Fake SendGrid Payment Failure Notification Used in Credential Theft Attempt
Attackers used a spoofed email address and convincing impersonated branding to deceive targets into exposing sensitive login details.
Fraudulent Crypto-Related PayPal Notification Used in Likely AI-Generated Phishing Attack
Cybercriminals impersonate PayPal and fabricate cryptocurrency charges to manipulate recipients into revealing sensitive information.
Attackers Use Figma Files to Deliver Microsoft 365 Phishing Links and Evade Detection
A phishing campaign leverages compromised vendor accounts and Figma-hosted documents with embedded links to spoof Microsoft 365 login pages and harvest credentials.
Threat Actors Use Bogus Microsoft Teams Alert to Steal Credentials in Likely AI-Generated Attack
Cybercriminals leverage impersonated branding to deceive users into revealing sensitive information.
Threat Actor Exploits BlockFi Shutdown to Steal User Credentials in Likely AI-Generated Phishing Attack
Cybercriminals impersonate BlockFi, preying on former customers with bogus notifications regarding potential fund withdrawals.
Attackers Exploit Google Calendar Invites to Deliver Phishing Links via Google Drawings
A scam uses Google Calendar invite notifications and embedded Google Drawings to redirect targets to a fraudulent Bitcoin-themed phishing site.
Spoofed American Express Security Alert Exploits Urgency to Steal Credentials
Phishers send a bogus fraudulent activity notification to trick recipients into revealing sensitive information.
Fake Stripe Chargeback Alert Exploits PandaDoc to Steal Business Credentials
Attackers impersonate Stripe and exploit trusted document-sharing services to deceive business owners into revealing sensitive information.
Business Email Compromise Attack Uses Punycode Domains and Executive Impersonation to Evade Detection
A BEC attack leverages executive impersonation and subtle domain spoofing with Punycode to request sensitive financial data while bypassing traditional email security.
American Express Impersonator Uses Verification Request to Steal Data in Likely AI-Generated Phishing Attack
Cybercriminals pose as American Express, and attempt to deceive recipients into providing sensitive information.
Etsy Impersonators Use Policy Violation Alert to Attempt Sensitive Data Theft in Likely AI-Generated Attack
Threat actors pose as Etsy and claim the target’s account has been suspended to deceive them into providing private information.
Fake Netflix Billing Alert Exploits Urgency to Steal User Information
Phishing attack uses a lookalike domain to impersonate Netflix and harvest login credentials and payment details.
Attackers Impersonate Apple in Likely AI-Generated Gift Card Scam
Threat actors pose as Apple and send a suspicious account activity alert with a request for verification to deceive targets into sending gift card details.
Corrupted Word Attachment Uses QR Code to Bypass Scanners and Phish Microsoft 365 Credentials
A phishing campaign uses intentionally corrupted Word documents with embedded QR codes to bypass scanners and steal Microsoft 365 credentials.