Attacker impersonates the LinkedIn billing department and references the recent closure of SVB in this likely AI-generated attack.
An attacker uses a generative AI tool to spoof an insurance company, hoping to steal login credentials.
By leveraging urgency, an attacker sends an internal company communication in an attempt to steal credentials.
An attacker impersonates a popular cryptocurrency exchange and creates a fake website to steal login credentials.
An attacker gains access to a compromised account and attempts to redirect large invoices to a new offshore bank.
Using a cleverly disguised no-reply domain, an attacker poses as Apple customer support in an attempt to get billing details and other sensitive information.
An attacker changes one letter of a domain to a similar-looking letter in an attempt to redirect a large invoice.
Using a lookalike domain, an attacker uses conversational language in a fake billing scam.
By removing a single letter in the sending domain to still appear legitimate, an attacker attempts to redirect a large invoice.
After a vendor account is compromised, an attacker references unpaid invoices and utilizes lookalike domains to attempt payment fraud.
An attacker hijacks an email account and communicates with two employees who are unaware the account has been compromised.
This attack uses a compromised vendor account and cc’s lookalike domains in an attempted wire transfer fraud.
By employing a look-alike domain name, an attacker attempts to redirect a large invoice totaling nearly $100k.
By leveraging a recent public health crisis and targeting universities, the attacker hopes to elicit immediate action and steal email credentials.
This attack features an impersonation by a well-known bank that attempts to steal account credentials.
This attack features an impersonation of an attorney on behalf of a debt relief agency in an attempt to receive a $1,000 payment.
A popular money transferring service is impersonated in an attempted extortion.
Attackers hijack an ongoing thread and create a lookalike domain to continue the conversation as part of an invoice fraud attack.
Attackers pose as existing vendors and use lookalike domain and real invoices in attempt to fraudulently update payment information.
Attackers disguise phishing email to VP at financial institution as notification that full storage capacity has been reached and emails will no longer be delivered.