Search the repository of unique attacks observed by the Abnormal Intelligence team.
Phisher Impersonates Booking.com to Steal Sensitive Information via Fake Customer Complaint Email

Cybercriminals exploit the trusted name of Booking.com to deceive recipients into entering personal details into a fraudulent login page.

Threat Actor Uses Prezi to Distribute Malware Disguised as Shared Tax Documents

Cybercriminal targets insurance agency with malware attack that exploits legitimate presentation software.

Phisher Impersonates Regions Bank and Sends Fraudulent Account Verification Request in Likely AI-Generated Attack

Cybercriminals create a sense of urgency with a spoofed Regions Bank email, tricking recipients into divulging personal details through a phishing site.

Phishing Attack Exploits Compromised Email to Impersonate Amazon and Steal Sensitive Information

Cybercriminals attempt to manipulate recipients into updating payment details on a fraudulent website by posing as Amazon.

Attackers Pose as American Financial Group and Send Malware Disguised as Password-Protected Zip File

Threat actors exploit the trust in a financial services company to trick recipients into downloading malicious attachments.

Cybercriminals Pose as Capital One Using a Spoofed Email in Credential Phishing Attack

A threat actor sends a fraudulent account alert linked to a phishing website to deceive recipients into revealing confidential information.

Phishing Attack Impersonates myGov Using Spoofed Email to Steal Sensitive Information

Attackers exploit the urgency of government notifications to deceive recipients into providing personal details through a fake myGov email.

Apple Pay Impersonator Spoofs Legitimate Domain to Steal Login Credentials in Likely AI-Generated Attack

Attackers exploit the urgency of unauthorized activity alerts to deceive recipients into providing sensitive information.

American Express Impersonator Uses URL Shortener and Spoofed Email Address in Phishing Attack

Attackers exploit the urgency of credit issues to deceive recipients into providing personal details through a spoofed American Express email.

Attacker Impersonates Chicago Title Insurance Company Using Compromised Email to Steal Sensitive Information

Threat actor sends fraudulent file-sharing notification linked to cleverly disguised phishing website to deceive recipients into revealing confidential information.

Amazon Impersonator Uses Potentially Compromised Email to Steal Login Credentials in Likely AI-Generated Phishing Attack

Attackers use a spoofed email address and exploit the urgency of security issues with an Amazon account to deceive the recipient into providing sensitive information.

PayPal Impersonator Sends Unauthorized Transaction Alert Using Fake Outlook Email in Likely AI-Generated Vishing Attack

A threat actor exploits fears of identity theft to manipulate the recipient into contacting fraudulent support numbers and initiate the next phase of the attack.

Threat Actor Uses Spoofed Email Address and Malicious QR Code to Attempt Credential Theft

An attacker impersonates an internal HR department to manipulate employees into scanning a malicious QR code under the guise of viewing benefits information.

Phishing Attack Impersonates Dashlane Using Lookalike Domain to Steal Sensitive Information

Attackers exploit the urgency of account verification to deceive recipients into disclosing personal data through a spoofed Dashlane email.

Threat Actors Impersonate IRS and ID.me in Sophisticated Phishing Attempt

Using a spoofed email and a convincing phishing site, attackers attempt to steal sensitive information under the guise of identity verification.

DHL Impersonator Uses Spoofed Email to Trick Recipients into Paying Fraudulent Fees

Attackers exploit the urgency of parcel delivery issues to steal payment details via a spoofed DHL email.

Phisher Impersonates Roundcube and Uses Deceptive Gmail Address to Attempt Credential Theft

An attacker creates a sense of urgency by threatening email discontinuation and prompts the recipient to enter account information into a phishing page mimicking a legitimate login portal.

Phishing Attack Impersonates Wells Fargo Using Newly-Registered Domain to Steal Sensitive Information

Attackers use a malicious email and fraudulent website to exploit the urgency of account security and deceive recipients.

Venmo Impersonator Uses Free Russian Webmail Account to Initiate Fraudulent Fund Transfer

Attackers exploit the trust in Venmo's brand to deceive recipients into refunding non-existent payments.

Threat Actor Uses Impersonation and Spoofing to Deliver Malicious Payload in Likely AI-Generated Attack

Using a spoofed email address, an attacker poses as a known brand and attempts to convince the target to open a malicious attachment.

Filters

Attack Type

Impersonated Party

Impersonated Brand

Attack Goal

Attack Vector

Attack Tactic

Attack Theme

Attack Language

AI-Generated