A threat actor spoofs a Japanese domain and impersonates Canada Post to prompt targets to click on a credential phishing link.
After compromising the account, an attacker creates a fake document purporting to be a faxed invoice that includes a masked phishing link.
By creating a sense of urgency around unauthorized account activity and using a display name that includes "Chase Bank," the attacker aims to compel the recipient to take action.
An attacker claims to be from PayPal investigating a fraudulent transaction and requests sensitive information from the target to complete a verification process.
An attacker attempts credential theft by impersonating Trust Wallet and sending a phishing link disguised as an account verification page.
An attacker informs the target about copyright infringement and provides a fake form and login page to steal login credentials.
An attacker attempts to create a sense of urgency and compel the target to call a fake customer service number by sending a bogus receipt for a recent iPhone purchase.
Using a “two-bridge[.]com” domain as a mask, an attacker sends a credential phishing email disguised as an HR department update regarding approval of a new company handbook.
After compromising a legitimate domain, an attacker impersonates UPS and asks the recipient to verify shipping information via a phishing link.
After compromising the email account of a Vanguard Cleaning Systems employee, an attacker creates a legitimate-looking PDF with a masked phishing link to steal credentials.
Using a legitimate Turkish domain, an attacker attempts credential theft by applying social engineering to convince a target their cryptocurrency wallet is at risk of suspension.
An attacker attempts to develop trust with a recipient and set the stage for future credential theft by referencing past interactions and updates on a $800,000 investment.
Using a legitimate domain as a mask, an attacker attempts to infect a recipient’s computer with malware via an HTML attachment.
An attacker pretends to be from Amazon customer service and informs the recipient that their account is locked because of suspicious account activity.
After compromising a domain, an attacker creates a fake Microsoft SharePoint attachment viewer in an attempt to steal money and sensitive information.
After compromising a legitimate domain, an attacker creates a fake landing page and impersonates an internal IT admin to attempt credential theft.
After compromising a Titan Worldwide domain, an attacker pastes previous conversations and a masked phishing link into an email in an attempt to steal sensitive information.
An attacker pretends to be from Medicare Australia and informs the recipient that their Medicare services have been suspended due to insufficient contact information.
An attacker creates a domain visually similar to Salesforce [.]com, engages the target, and then forwards the thread to another colleague, heightening the chances of a successful scam.
An attacker uses a legitimate NHS domain and Microsoft SharePoint to trick a recipient into clicking on a masked phishing link and exposing sensitive information.