Filters
Reset
Attack Type
Attack Vector
Attack Goal
Attack Tactic
Impersonated Party
Attachment Type
Language
Theme
Impersonated Brand
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Attack Vault

Showing
X
results

The Attack Vault contains samples of email-based cyber attacks targeting enterprise users, including business email compromise (BEC) attacks, financial supply chain fraud, credential phishing, malware attacks, and other types of scams. The email subject and body content of these samples can be searched and the repository can be filtered based on specific characteristics using the options below.

This collection of attack samples is not meant to be a comprehensive repository of all email-based threats. Rather, the Attack Vault contains a cross-section of various types of cyber threats--each containing a unique combination of tactics, themes, and/or content--to provide a general overview of some of the more notable attacks observed in today's email threat landscape.

Hola nómina,

Me gustaría cambiar la cuenta de mi Nómina a una cuenta nueva y me
gustaría saber si será efectivo para el próximo pago?

Gracias.

[Employee Name]
[Employee Title]

Spanish Employee Impersonation Payroll Diversion BEC Attack

Subject:
"
Cuenta de nómina actualizada
"
Attack Date:
May 10, 2022

This text-based Spanish-language BEC attack impersonates an employee using a spoofed display name and a free webmail account to divert payroll deposits to a fraudulent account.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payroll Diversion
Impersonated Party:
Employee - Other
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

You've received a new SharePoint Project Document:

Project     [Recipient Company Name] Building Project

Title     [Recipient Company Name] Building Project Documents

Bid No.     1232-05102022

From     [Recipient Name]   ([Recipient Email Address])

Subject     Bid Documents, Drawing, Scope of Work and Purchase Order

VIEW SHAREPOINT PROJECT DOCUMENTS

Do not hesitate to send me an email if you have any question.

Please find attached project documents to bid for the above referenced project. Review the documents, send back requested information, and provide bid proposal or quotes based on the scope of work outlined in the bid documents.

Thanks,

Thank you

SharePoint Fake Document Credential Phishing Attack

Subject:
"
[Recipient Company Name] Building Project Documents
"
Attack Date:
May 10, 2022

This link-based attack impersonates SharePoint using a self-addressed spoofed email address, a personalized subject, and a fake document theme to steal credentials.

No items found.
Type:
Credential Phishing
Theme(s):
...
Tactic(s):
...
Vector:
Link-based
Goal:
Credential Theft
Impersonated Party:
Impersonated Brand:
SharePoint
Attachment Type:
Language:
See Attack Details

Hi,

A new online SharePoint proposal document has been sent to your desk, kindly see pdf using the secured URL below.

VIEW DOCUMENT.PDF

This is a sensitive and secured file. Please use your sign in details to access document

If you have any question, please don’t hesitate to email me.

Thanks for understanding,


[Recipient Signature]

SharePoint Fake Document Credential Phishing Attack

Subject:
"
New Project 10-05-2022
"
Attack Date:
May 10, 2022

This link-based attack impersonates SharePoint using a self-addressed spoofed email address and a fake document theme to steal credentials.

No items found.
Type:
Credential Phishing
Theme(s):
...
Tactic(s):
...
Vector:
Link-based
Goal:
Credential Theft
Impersonated Party:
Impersonated Brand:
SharePoint
Attachment Type:
Language:
See Attack Details

Hello [Recipient First Name]

Hope you don't have so much on your plate? Well in case you do, kindly
peg it. I want you to perform a confidential task for me urgently, let
me know if you are available and also reply back with your personal
phone number or your valid WhatsApp number so that i can brief you.

Best Regards,
[Executive Name]

Sent from my iPhone.

Executive Impersonation Employee Incentive Gift Card Request BEC Attack

Subject:
"
Employee Incentive Programs.
"
Attack Date:
May 10, 2022

This text-based BEC attack impersonates an executive using a spoofed display name, a free webmail account, a cell phone number request, a WhatsApp number request, and an employee incentive theme to request the purchase of gift cards.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Gift Card Request
Impersonated Party:
Employee - Executive
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Good day,


This is a follow up on all of our invoices past due, can you let us know if any will be processed this week, Please also note that we have updated our remittance information and want payment sent to us via ACH direct deposit to our updated bank account.

Thank you.

[Impersonated Vendor Employee Name]

[Impersonated Vendor Company Name]

Accounts Receivable

[Impersonated Vendor Contact Details]

Vendor Impersonation Account Update BEC Attack

Subject:
"
[Vendor Name] invoice payment
"
Attack Date:
May 10, 2022

This text-based BEC attack impersonates a vendor/supplier using a spoofed display name, a look-alike domain, and an account update theme to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
External Party - Vendor/Supplier
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

[Compromised Sender Domain] sent you a document to review and sign.

REVIEW DOCUMENT

Thank you,

[Compromised Sender Signature]

External Third Party Fake Document Credential Phishing Attack

Subject:
"
Price Change Notification for 000126554434
"
Attack Date:
May 10, 2022

This link-based attack impersonates an external third party using an external compromised account and a fake document theme to steal credentials.

No items found.
Type:
Credential Phishing
Theme(s):
...
Tactic(s):
...
Vector:
Link-based
Goal:
Credential Theft
Impersonated Party:
External Party - Other
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Hallo Payroll,

Ik wil de rekening op mijn Payroll wijzigen naar een nieuwe rekening
en ik zou graag willen weten of deze geldig is voor de volgende
betaling?

Bedankt

[Employee Name]
[Employee Title]

Dutch Employee Impersonation Payroll Diversion BEC Attack

Subject:
"
Salarisrekening bijgewerkt
"
Attack Date:
May 10, 2022

This text-based Dutch-language BEC attack impersonates an employee using a spoofed display name and a free webmail account to divert payroll deposits to a fraudulent account.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payroll Diversion
Impersonated Party:
Employee - Other
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Dear Partner,

We kindly ask that you re-confirm to us the status of our outstanding or
any due payments if there are any, as we currently have to give you an
updated information.

Please get back to us immediately with the total amount that is
outstanding with corresponding due dates and invoices respectively.

If you need any further information, please do not hesitate to contact
me for further assistance.

Thank you for your compliance.

Kinds Regards
[Impersonated Vendor Employee Name] ([Impersonated Vendor Employee Title])
[Impersonated Vendor Company Name]

Vendor Impersonation Payment Inquiry BEC Attack

Subject:
"
INVOICE'S DUE/OPEN "UPDATE"
"
Attack Date:
May 10, 2022

This text-based BEC attack impersonates a vendor/supplier using a spoofed email address, a free webmail account, and a payment inquiry theme to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
External Party - Vendor/Supplier
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Hello,

kindly re-confirm Cell phone number,
Your Recognition is required to get a task completed real quick. I will
be expecting your feedback

thanks...

Executive Impersonation Gift Card Request BEC Attack

Subject:
"
[Recipient First Name]
"
Attack Date:
May 9, 2022

This text-based BEC attack impersonates an executive using a personalized email subject, a cell phone number request, a spoofed email address, and a free webmail account to request the purchase of gift cards.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Gift Card Request
Impersonated Party:
Employee - Executive
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Hi [Recipient First Name],
         Please can we process a payment today? for a legal consultation ordered by myself.
       
Best Regards
[Executive Name].

Executive Impersonation Legal Matter Payment Fraud BEC Attack

Subject:
"
consulting
"
Attack Date:
May 9, 2022

This text-based BEC attack impersonates an executive using a spoofed display name, a free webmail account, and a legal matter theme to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
Employee - Executive
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Whoops.. There are no results found.