Search the repository of unique attacks observed by the Abnormal Intelligence team.
Threat Actors Leverage PandaDoc and Dropbox to Deliver Decoy File and Phish for Microsoft Credentials

Attackers use PandaDoc and Dropbox links to disguise credential phishing behind a decoy document and bypass secure email gateways.

Attackers Leverage Fake Zoom Invites to Deliver Remote Access Tool During Tax Season

A phishing email disguised as a Zoom invite tricks targets into downloading ScreenConnect, giving attackers remote access to the target's computer.

Job Application Lures Use Dropbox-Hosted Resume to Deliver Remote Access Trojan

A fake CV hosted on Dropbox delivers a multi-stage VBS loader, ultimately dropping Remcos RAT after geofencing and sandbox checks.

QR Code Phishing Attack Uses Embedded MHT Files in Payroll-Themed Documents

A salary-themed phishing email delivers a DOCX file with an embedded MHT and hidden QR code that leads to a phishing site.

Attackers Mimic ADFS Login Pages to Steal Credentials and Bypass MFA for Account Takeover

A phishing email spoofing IT notifications leads users to a fake ADFS login page, capturing credentials and MFA tokens to enable account takeover.

Adaptive Phishing Attack Uses Whimsical and Lucid to Deliver Office 365 Credential Phish

A phishing campaign uses a trusted vendor account and design platforms Whimsical and Lucid to deliver a fake Office 365 login and steal user credentials.

Phishers Send Fake Microsoft 365 Account Verification Request in Likely AI-Generated Attack

Threat actors send fraudulent notification regarding Microsoft 365 updates to deceive targets into revealing account credentials.

Fraudulent Crypto-Related PayPal Notification Used in Likely AI-Generated Phishing Attack

Cybercriminals impersonate PayPal and fabricate cryptocurrency charges to manipulate recipients into revealing sensitive information.

Attackers Use Figma Files to Deliver Office 365 Phishing Links and Evade Detection

A phishing campaign leverages compromised vendor accounts and Figma-hosted documents with embedded links to spoof Office 365 login pages and harvest credentials.

Threat Actors Use Bogus Microsoft Teams Alert to Steal Credentials in Likely AI-Generated Attack

Cybercriminals leverage impersonated branding to deceive users into revealing sensitive information.

Threat Actor Exploits BlockFi Shutdown to Steal User Credentials in Likely AI-Generated Phishing Attack

Cybercriminals impersonate BlockFi, preying on former customers with bogus notifications regarding potential fund withdrawals.

Attackers Exploit Google Calendar Invites to Deliver Phishing Links via Google Drawings

A scam uses Google Calendar invite notifications and embedded Google Drawings to redirect targets to a fraudulent Bitcoin-themed phishing site.

Spoofed American Express Security Alert Exploits Urgency to Steal Credentials

Phishers send a bogus fraudulent activity notification to trick recipients into revealing sensitive information.

Fake Stripe Chargeback Alert Exploits PandaDoc to Steal Business Credentials

Attackers impersonate Stripe and exploit trusted document-sharing services to deceive business owners into revealing sensitive information.

Business Email Compromise Attack Uses Punycode Domains and Executive Impersonation to Evade Detection

A BEC attack leverages executive impersonation and subtle domain spoofing with Punycode to request sensitive financial data while bypassing traditional email security.

American Express Impersonator Uses Verification Request to Steal Data in Likely AI-Generated Phishing Attack

Cybercriminals pose as American Express, and attempt to deceive recipients into providing sensitive information.

Etsy Impersonators Use Policy Violation Alert to Attempt Sensitive Data Theft in Likely AI-Generated Attack

Threat actors pose as Etsy and claim the target’s account has been suspended to deceive them into providing private information.

Fake Netflix Billing Alert Exploits Urgency to Steal User Information

Phishing attack uses a lookalike domain to impersonate Netflix and harvest login credentials and payment details.

Attackers Impersonate Apple in Likely AI-Generated Gift Card Scam

Threat actors pose as Apple and send a suspicious account activity alert with a request for verification to deceive targets into sending gift card details.

Phishing Attack Mimics Microsoft Teams Alert to Steal Sensitive Information

Cybercriminals use a spoofed address to send a fake message notification designed to trick recipients into revealing private information.

Filters

Attack Type

Impersonated Party

Impersonated Brand

Attack Goal

Attack Vector

Attack Tactic

Attack Theme

Attack Language

AI-Generated

See How Abnormal Stops Emerging Attacks

See a Demo