Attack Library
Fraudulent Crypto-Related PayPal Notification Used in Likely AI-Generated Phishing Attack
Cybercriminals impersonate PayPal and fabricate cryptocurrency charges to manipulate recipients into revealing sensitive information.
Attackers Use Figma Files to Deliver Microsoft 365 Phishing Links and Evade Detection
A phishing campaign leverages compromised vendor accounts and Figma-hosted documents with embedded links to spoof Microsoft 365 login pages and harvest credentials.
Threat Actors Use Bogus Microsoft Teams Alert to Steal Credentials in Likely AI-Generated Attack
Cybercriminals leverage impersonated branding to deceive users into revealing sensitive information.
Threat Actor Exploits BlockFi Shutdown to Steal User Credentials in Likely AI-Generated Phishing Attack
Cybercriminals impersonate BlockFi, preying on former customers with bogus notifications regarding potential fund withdrawals.
Attackers Exploit Google Calendar Invites to Deliver Phishing Links via Google Drawings
A scam uses Google Calendar invite notifications and embedded Google Drawings to redirect targets to a fraudulent Bitcoin-themed phishing site.
Spoofed American Express Security Alert Exploits Urgency to Steal Credentials
Phishers send a bogus fraudulent activity notification to trick recipients into revealing sensitive information.
Fake Stripe Chargeback Alert Exploits PandaDoc to Steal Business Credentials
Attackers impersonate Stripe and exploit trusted document-sharing services to deceive business owners into revealing sensitive information.
Business Email Compromise Attack Uses Punycode Domains and Executive Impersonation to Evade Detection
A BEC attack leverages executive impersonation and subtle domain spoofing with Punycode to request sensitive financial data while bypassing traditional email security.
American Express Impersonator Uses Verification Request to Steal Data in Likely AI-Generated Phishing Attack
Cybercriminals pose as American Express, and attempt to deceive recipients into providing sensitive information.
Etsy Impersonators Use Policy Violation Alert to Attempt Sensitive Data Theft in Likely AI-Generated Attack
Threat actors pose as Etsy and claim the target’s account has been suspended to deceive them into providing private information.
Fake Netflix Billing Alert Exploits Urgency to Steal User Information
Phishing attack uses a lookalike domain to impersonate Netflix and harvest login credentials and payment details.
Attackers Impersonate Apple in Likely AI-Generated Gift Card Scam
Threat actors pose as Apple and send a suspicious account activity alert with a request for verification to deceive targets into sending gift card details.
Corrupted Word Attachment Uses QR Code to Bypass Scanners and Phish Microsoft 365 Credentials
A phishing campaign uses intentionally corrupted Word documents with embedded QR codes to bypass scanners and steal Microsoft 365 credentials.
Adobe Creative Cloud Phishing Attack Delivers Fake Microsoft 365 Login Page
Threat actors use Adobe Creative Cloud to host a phishing document with a link to a spoofed Microsoft 365 login page protected by a Cloudflare Turnstile.
Executive Impersonation BEC Attack Targets Customer Payment Records
An attacker impersonates C-suite executives to trick employees into sharing sensitive financial information—no links, no attachments, just trust exploited.
Internal Account Takeover Leads to Lateral Phishing via Wix-Hosted Data Collection Form
An attacker uses a compromised internal account to send a link to a Wix-hosted form that harvests sensitive information from coworkers.
Phishing Attack Mimics Microsoft Teams Alert to Steal Sensitive Information
Cybercriminals use a spoofed address to send a fake message notification designed to trick recipients into revealing private information.
Spoofed DHL Email with Malicious QR Code Targets Recipients in Likely AI-Generated Credential Theft Attempt
Attackers impersonate DHL and email a PDF attachment containing a malicious QR code linked to a phishing page.
Spoofed Capital One Email Uses Account Freeze Alert to Steal Credentials
Phishing attack exploits urgency and trust to deceive recipients into revealing sensitive information.
Fake Shopify Deactivation Notice Exploits Telegram to Harvest Sensitive Information in Likely AI-Generated Attack
Cybercriminals impersonate Shopify to mislead recipients into engaging with a fraudulent Telegram support account.