An attacker posing as a vendor attempts to solicit overdue payments by using a lookalike email address.
Attackers impersonate the human resources team to inform employees of salary increases, luring them to follow phishing links.
Attackers ask to update bank account details for an employee, using a spoofed email address to avoid detection.
An attacker email containing an image of an Adobe Acrobat fax link leads to a phishing website hosted on Dropbox infrastructure.
Attackers impersonate the HR department to deliver an updated Employee Benefits Eligibility Policy as part of a credential phishing attack.
Attackers impersonate Accounts Payable to deliver a payroll remittance attachment that contains malware.
Attackers impersonate an executive and rely on human willingness to help in order to request a surprise appreciation gift for the team.
Attackers impersonate an executive to bolster the validity of a fraudulent invoice in this double-phased attack that requests payment for an overdue invoice.
The attacker impersonates a Dutch executive and requests that payment be made now to a company in England.
Cybercriminals impersonate an executive and target the payroll administrator in an ask to update direct deposit information to a bank account owned by the attacker.
Increasingly popular, this phone fraud scam tricks recipients into believing that a payment has been made and encourages them to call a number to fix the problem.
Attackers impersonate DHL and ask the recipient to check their shipping documents, hidden behind a fake Microsoft 365 credential phishing page.
Attackers impersonate a VIP within the organization to request an aging report of all outstanding vendor names and invoices.
This attack uses an ongoing email thread from a compromised vendor and password protected file to evade security solutions and deliver malware.
Attackers use an external compromised vendor account and a receipt confirmation to trick recipients into providing their Microsoft 365 credentials.
Attackers impersonate a vendor by using a lookalike domain, stating that their banking details have changed and all new invoices should be directed to the new account.
Attackers send what appears to be an encrypted message, similar to what you might receive from your bank, to trick recipients into providing Microsoft 365 login information.
Attackers impersonate an encrypted Microsoft email focused on paystub registration to steal Microsoft 365 credentials.
Attackers use well-known document management service DocuSign to trick users into providing Outlook login credentials.
Attackers impersonate the CEO using a spoofed email address to ask the recipient if they have been contacted by an attorney to facilitate an acquisition as the first stage of an attack designed to intercept a transaction.