Attackers pose as existing vendors and use lookalike domain and real invoices in attempt to fraudulently update payment information.
Attackers disguise phishing email to VP at financial institution as notification that full storage capacity has been reached and emails will no longer be delivered.
Attackers pose as the internal support team at an online retailer and claim the recipient's email account has been queued for deactivation in an attempt to steal credentials or install malware.
This malware attack impersonated a real attorney at a real firm using Dropbox to transfer a file purported to be a contract that is likely malicious.
This attack posted as a shared settlement document containing a malicious OneNote (.ONE) attachment to deliver malware.
This attack posed as a prospective client requesting assistance on tax returns that was used to deliver malware via a malicious link in a follow-up message.
This link-based attack hijacked an email thread from a compromised account to deliver a link leading to a fake TeamViewer page which attempts to download malware.
An old email thread is hijacked and used to send a link to likely malware payload.
Attackers impersonate Accounts Payable to deliver a payroll remittance attachment that contains malware.
This attack uses an ongoing email thread from a compromised vendor and password protected file to evade security solutions and deliver malware.
Attackers impersonate a generic support team as part of a multi-stage malware attack, first informing the recipient that their password needs reset and asking them to call for support.
Attackers trick recipients into opening a ZIP file containing malware by stating that the file contains payment information for a recent purchase.