The Abnormal Attack Vault
Vendor Impersonated with Hijacked Email Thread to Steal Payments
Attackers impersonate a vendor using a hijacked email thread and a lookalike domain to request payment for a fraudulent invoice worth nearly $10,000.
Payment Inquiry Credential Phishing Attack
This link-based attack impersonates a vendor/supplier using an external compromised account and a payment inquiry theme to steal credentials.
Vendor Impersonation Payment Inquiry Credential Phishing Attack
This text-based attack impersonates a vendor/supplier using a look-alike domain, a spoofed display name, and a payment inquiry theme to steal credentials.
Fake Invoice Credential Phishing Attack
This link-based attack impersonates a vendor/supplier using an external compromised account and a fake invoice theme to steal credentials.
Vendor Impersonation Payment Inquiry BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain and a payment inquiry theme to request a fraudulent payment.
Vendor Impersonation Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a hijacked email thread, a look-alike domain, an external compromised account, and an account update theme to request a fraudulent payment.
Vendor Impersonation Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain, a spoofed display name, and an account update theme to request a fraudulent payment.
Vendor Impersonation Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a spoofed email address, a look-alike domain, a personalized email subject, and an account update theme to request a fraudulent payment.
Vendor Impersonation Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain, a spoofed display name, and an account update theme to request a fraudulent payment.
Vendor Impersonation Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a hijacked email thread, a look-alike domain, a spoofed display name, and an account update theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain, a spoofed display name, and an overdue payment theme to request a fraudulent payment.
Overdue Payment HTML Attachment Credential Phishing Attack
This payload-based attack impersonates a vendor/supplier using an external compromised account, a personalized email subject, and an overdue payment theme to steal credentials.
Fake Invoice Credential Phishing Attack
This link-based attack impersonates a vendor/supplier using a fake attachment, an external compromised account, and a fake invoice theme to steal credentials.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain, a spoofed display name, and an overdue payment theme to request a fraudulent payment.
Vendor Impersonation Payment Inquiry BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a fake email chain, a look-alike domain, and a payment inquiry theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain and an overdue payment theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment Payment Inquiry BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a spoofed email address, a free webmail account, an overdue payment theme, and a payment inquiry theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain and an overdue payment theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain, a spoofed display name, and an overdue payment theme to request a fraudulent payment.
Vendor Impersonation Payment Inquiry Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain, a spoofed display name, a payment inquiry theme, and an account update theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain and an overdue payment theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a spoofed email address, a look-alike domain, a matching malicious domain username, and an overdue payment theme to request a fraudulent payment.
Fake Invoice Credential Phishing Attack
This link-based attack impersonates a vendor/supplier using a fake attachment, an external compromised account, and a fake invoice theme to steal credentials.
Fake Invoice Word Document Attachment Credential Phishing Attack
This payload-based attack impersonates a vendor/supplier using an external compromised account and a fake invoice theme to steal credentials.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain and an overdue payment theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a maliciously registered domain and an overdue payment theme to request a fraudulent payment.
Fake Invoice Word Document Attachment Credential Phishing Attack
This payload-based attack impersonates a vendor/supplier and DocuSign using an external compromised account, a Word Document attachment, and a fake invoice theme to steal credentials.
Vendor Impersonation Payment Inquiry BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a spoofed email address, a free webmail account, and a payment inquiry theme to request a fraudulent payment.
Fake Invoice Link-based Malware Attack
This link-based attack impersonates a vendor/supplier using a self-addressed spoofed email and a fake invoice theme to deliver malware.
Fake Invoice HTML Attachment Credential Phishing Attack
This link-based attack impersonates a vendor/supplier using a compromised external account and a fake invoice theme to steal credentials.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a spoofed display name, a look-alike domain, and an overdue payment theme to request a fraudulent payment.
Vendor Impersonation Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a spoofed display name, a look-alike domain, and an account update theme to request a fraudulent payment.
Vendor Impersonation Payment Inquiry BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a spoofed email address, a free webmail account, and a payment inquiry theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a spoofed display name, a maliciously registered domain, an overdue payment theme, and an account update theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain and an overdue payment theme to request a fraudulent payment.
Vendor Impersonation Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using display name spoofing, a look-alike domain, and an account update theme to request a fraudulent payment.
Vendor Impersonation Payment Inquiry BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a free webmail account and a payment inquiry theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a maliciously registered domain and an overdue payment theme to request a fraudulent payment.
Adobe Fake Document Credential Phishing Attack
This link-based attack impersonates Adobe using an external compromised account and a fake document theme to steal credentials.
Vendor Impersonation Payment Inquiry BEC Attack
This text-based BEC attack impersonates a vendor/supplier using email spoofing, a free webmail account, and a payment inquiry theme to request a fraudulent payment.
Vendor Impersonation Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a look-alike domain, display name spoofing, and a payment account update theme to request a fraudulent payment.
Vendor Impersonation Fake Invoice Credential Phishing Attack
This link-based attack impersonates a vendor/supplier using a fake attachment, compromised external account, and a fake invoice theme to steal credentials.
Vendor Impersonation Fake Email Chain BEC Attack
This text-based BEC attack impersonates a vendor/supplier using a fake email chain, display name spoofing, and a look-alike domain to request a fraudulent payment.
Vendor Impersonation Payment Inquiry BEC Attack
This text-based BEC attack impersonates a vendor/supplier using email address spoofing, a free webmail account, an overdue payment theme, and a payment account update theme to request a fraudulent payment.
Vendor Impersonation Payment Fraud Overdue Payment Account Update BEC Attack
This text-based BEC attack impersonates a vendor/supplier using display name spoofing, a look-alike domain, an overdue payment theme, and a payment account update theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using display name spoofing, a maliciously registered domain, an overdue payment theme, and a payment account update theme to request a fraudulent payment.
Vendor Impersonation Overdue Payment BEC Attack
This text-based BEC attack impersonates a vendor/supplier using display name spoofing a maliciously registered domain, and an overdue payment theme to request a fraudulent payment.