A threat actor exploits fears of identity theft to manipulate the recipient into contacting fraudulent support numbers and initiate the next phase of the attack.
An attacker impersonates an internal HR department to manipulate employees into scanning a malicious QR code under the guise of viewing benefits information.
An attacker creates a sense of urgency by threatening email discontinuation and prompts the recipient to enter account information into a phishing page mimicking a legitimate login portal.
Attackers use a spoofed email to exploit the trust of Spotify users and direct them to a phishing site under the guise of updating payment information.
A threat actor claims the target has signed up for the streaming service and includes a fabricated invoice to compel them to contact a fake customer support line.
By posing as SiriusXM and offering a free 90-day subscription extension, an attacker hopes to convince the target to provide their credit card information.
A threat actor exploits the trust of a known brand and manufactures urgency to deceive recipients into downloading malware under the guise of restoring account access.
An attacker attempts to steal sensitive information by impersonating AWS and encouraging the target to click a phishing link disguised as an application for an account credit.
A cybercriminal impersonates Craigslist and sends a likely AI-generated email regarding a payment failure to convince the target to provide payment details.