Search the repository of unique attacks observed by the Abnormal Intelligence team.
BEC Attack Requests New Payment Methods for Outstanding Invoices in Attempted Payment Fraud

After gaining access to a legitimate account, an attacker attempts payment fraud by requesting ACH transfers instead of payments via check.

Amazon Spoofer Attempts Credential Phishing with Look-alike Domain

Using friendly language and a hidden malicious link, an attacker impersonates Amazon to steal sensitive information.

Sophisticated USPS Impersonator Attempts Credential Theft in Multi-Layered Attack

An attacker likely uses generative AI to create a fake automated USPS message about incorrect address information, including links to a fake USPS landing page.

Investment Opportunity Spoofer Offers Financial Services in Likely AI-Generated Scam

An attacker offers business financing options and promises commission for all successful referrals using a spoofed address.

Cosmetics Brand Impersonator Attempts Payment Fraud in Fake Billing Scam

An attacker uses generative AI to attempt payment fraud by impersonating an Australian cosmetics brand.

Freight Company Impersonated in Likely AI-Generated Credential Theft Attempt

An attacker utilizes a close resemblance freight company DAT One's domain in a credential theft attempt.

Australian Government Spoofer Promises Tax Refund in Likely AI-Generated Credential Theft

An attacker pretends to be from the “Australian Taxation Office” to steal the victim’s login credentials by promising a tax refund.

Debt Collector Spoofer Attempts Credential Theft

An AI-generated attack impersonates a debt collector and creates a sense of urgency to attempt to steal personal information.

LinkedIn Spoofer Uses News of Silicon Valley Bank Closure to Attempt Payment Fraud

Attacker impersonates the LinkedIn billing department and references the recent closure of SVB in this likely AI-generated attack.

Likely AI-Generated Attack Attempts Credential Phishing

An attacker uses a generative AI tool to spoof an insurance company, hoping to steal login credentials.

AI-Generated Credential Theft Attempted via Internal Company Impersonation

By leveraging urgency, an attacker sends an internal company communication in an attempt to steal credentials.

Kraken Exchange Spoofer Attempts to Steal Login Information

An attacker impersonates a popular cryptocurrency exchange and creates a fake website to steal login credentials.

Compromised Account Used in Attempt to Siphon Nearly $4M Worth of Invoices

An attacker gains access to a compromised account and attempts to redirect large invoices to a new offshore bank.

Attacker Impersonates Apple to Request Billing Details

Using a cleverly disguised no-reply domain, an attacker poses as Apple customer support in an attempt to get billing details and other sensitive information.

Lookalike Domain with Single Letter Change Used for $82,000 Invoice Fraud

An attacker changes one letter of a domain to a similar-looking letter in an attempt to redirect a large invoice.

Attacker Posing as Vendor Requests Early Payment of $240,000 Invoice

Using a lookalike domain, an attacker uses conversational language in a fake billing scam.

Attacker Uses Lookalike Domain to Attempt Receipt of $621,000 Invoice

By removing a single letter in the sending domain to still appear legitimate, an attacker attempts to redirect a large invoice.

Attacker Follows Up On Unpaid $132,000 Invoice Using Compromised Vendor Account

After a vendor account is compromised, an attacker references unpaid invoices and utilizes lookalike domains to attempt payment fraud.

Multiple Employees Engage with a Compromised Vendor Account Requesting New Banking Details

An attacker hijacks an email account and communicates with two employees who are unaware the account has been compromised.

$45,000 Wire Transfer Fraud Attempt from Compromised Vendor Account

This attack uses a compromised vendor account and cc’s lookalike domains in an attempted wire transfer fraud.


Attack Type

Impersonated Party

Impersonated Brand

Attack Goal

Attack Vector

Attack Tactic

Attack Theme

Attack Language