Search the repository of unique attacks observed by the Abnormal Intelligence team.
Citibank Impersonators Send Fake Account Update Alert from Spoofed Address in Credential Phishing Attempt

Attackers mimic Citibank security alerts to trick users into visiting a fake login page and divulging sensitive information.

Attackers Impersonate Coinbase and Send Fake Binance Payment Notification in Cryptocurrency Scam

Claiming the recipient has passively earned thousands of dollars in Bitcoin, threat actors attempt to deceive them into visiting a malicious credential-harvesting site.

Adaptive Phishing Attack Uses Whimsical and Lucid to Deliver Microsoft 365 Credential Phish

A phishing campaign uses a trusted vendor account and design platforms Whimsical and Lucid to deliver a fake Microsoft 365 login and steal user credentials.

Phishers Send Fake Adobe Acrobat Notification to Attempt Credential Theft

Attackers impersonate Adobe and use urgency around a time-sensitive document to trick employees into visiting a malicious site.

Fake FedEx Address Verification Email Uses QR Code to Steal Personal Data in Likely AI-Generated Attack

Phishers attempt to steal personal information by impersonating FedEx and sending targets a PDF containing a QR code linked to a malicious site.

Phishers Send Fake Microsoft 365 Account Verification Request in Likely AI-Generated Attack

Threat actors send fraudulent notification regarding Microsoft 365 updates to deceive targets into revealing account credentials.

Fake SendGrid Payment Failure Notification Used in Credential Theft Attempt

Attackers used a spoofed email address and convincing impersonated branding to deceive targets into exposing sensitive login details.

Fraudulent Crypto-Related PayPal Notification Used in Likely AI-Generated Phishing Attack

Cybercriminals impersonate PayPal and fabricate cryptocurrency charges to manipulate recipients into revealing sensitive information.

Attackers Use Figma Files to Deliver Microsoft 365 Phishing Links and Evade Detection

A phishing campaign leverages compromised vendor accounts and Figma-hosted documents with embedded links to spoof Microsoft 365 login pages and harvest credentials.

Threat Actors Use Bogus Microsoft Teams Alert to Steal Credentials in Likely AI-Generated Attack

Cybercriminals leverage impersonated branding to deceive users into revealing sensitive information.

Threat Actor Exploits BlockFi Shutdown to Steal User Credentials in Likely AI-Generated Phishing Attack

Cybercriminals impersonate BlockFi, preying on former customers with bogus notifications regarding potential fund withdrawals.

Attackers Exploit Google Calendar Invites to Deliver Phishing Links via Google Drawings

A scam uses Google Calendar invite notifications and embedded Google Drawings to redirect targets to a fraudulent Bitcoin-themed phishing site.

Spoofed American Express Security Alert Exploits Urgency to Steal Credentials

Phishers send a bogus fraudulent activity notification to trick recipients into revealing sensitive information.

Fake Stripe Chargeback Alert Exploits PandaDoc to Steal Business Credentials

Attackers impersonate Stripe and exploit trusted document-sharing services to deceive business owners into revealing sensitive information.

Business Email Compromise Attack Uses Punycode Domains and Executive Impersonation to Evade Detection

A BEC attack leverages executive impersonation and subtle domain spoofing with Punycode to request sensitive financial data while bypassing traditional email security.

American Express Impersonator Uses Verification Request to Steal Data in Likely AI-Generated Phishing Attack

Cybercriminals pose as American Express, and attempt to deceive recipients into providing sensitive information.

Etsy Impersonators Use Policy Violation Alert to Attempt Sensitive Data Theft in Likely AI-Generated Attack

Threat actors pose as Etsy and claim the target’s account has been suspended to deceive them into providing private information.

Fake Netflix Billing Alert Exploits Urgency to Steal User Information

Phishing attack uses a lookalike domain to impersonate Netflix and harvest login credentials and payment details.

Attackers Impersonate Apple in Likely AI-Generated Gift Card Scam

Threat actors pose as Apple and send a suspicious account activity alert with a request for verification to deceive targets into sending gift card details.

Corrupted Word Attachment Uses QR Code to Bypass Scanners and Phish Microsoft 365 Credentials

A phishing campaign uses intentionally corrupted Word documents with embedded QR codes to bypass scanners and steal Microsoft 365 credentials.

Filters

Attack Type

Impersonated Party

Impersonated Brand

Attack Goal

Attack Vector

Attack Tactic

Attack Theme

Attack Language

AI-Generated