Filters
Reset
Attack Type
Attack Vector
Attack Goal
Attack Tactic
Impersonated Party
Attachment Type
Language
Theme
Impersonated Brand
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Attack Vault

Showing
X
results

The Attack Vault contains samples of email-based cyber attacks targeting enterprise users, including business email compromise (BEC) attacks, financial supply chain fraud, credential phishing, malware attacks, and other types of scams. The email subject and body content of these samples can be searched and the repository can be filtered based on specific characteristics using the options below.

This collection of attack samples is not meant to be a comprehensive repository of all email-based threats. Rather, the Attack Vault contains a cross-section of various types of cyber threats--each containing a unique combination of tactics, themes, and/or content--to provide a general overview of some of the more notable attacks observed in today's email threat landscape.

Your credit card payment is pending and waiting for approval.


Account ending in: 4642

Payment amount: $12461.77

Effective date: 05/13/2022

Payment authorized on: 05/10/2022


See payment activity



Click Here To Decline or Accept


If you pay between 8 PM ET and 11:59 PM ET, we’ll credit your account for the date you chose, but you might not see it for 1-2 days.


If you pay after 8 PM ET on your due date and you pay at least the minimum amount due, you’ll see a late fee on your account that will be reversed automatically when the payment posts in 1-2 days.


We’ll process this one-time electronic payment as scheduled.


To cancel a payment scheduled for a future date, please visit us at chase.com or in our app.

Chase Fake Payment Receipt Credential Phishing Attack

Subject:
"
Electronic Payment
"
Attack Date:
May 12, 2022

This link-based attack impersonates Chase using an external compromised account and a fake payment receipt theme to steal credentials.

No items found.
Type:
Credential Phishing
Theme(s):
...
Tactic(s):
...
Vector:
Link-based
Goal:
Credential Theft
Impersonated Party:
Impersonated Brand:
Chase
Attachment Type:
Language:
See Attack Details

DHTGKGF-426429


Dear [Recipient Name]

We processed your $691.96 to Zerd-Crypto
(Bill Id@KJWE9045JKE1536)

Transaction ID

KJWE9045JKE1536

Seller

Zerd-Crypto

Doge coin

Transaction Date

May, 11 2022 (Wednesday)

Instruction to seller

#[Recipient Email Address]

Product

Quantity

 Amount

# (Zerd-Crypto)


1

$691.96

Subtotal

.

$691.96

Shipping

.

Free

Total

.

$691.96

Charge will appear on your credit card statement as "PayPal Already passed through your account and may take 24hrs to reflect."

If not you, connect us earliest as possible.

Customer Care No (888 - 370 (1580))

In case of any information regarding the product and charge please reach out to our PayPal Representative.

Regards : Nathan

In case of any trouble or query

This invoice is generated by PayPal

PayPal Cryptocurrency Fake Payment Receipt Fake Billing Scam

Subject:
"
[Recipient Name]# Bill Id : KJWE9045JKE1536
"
Attack Date:
May 11, 2022

This text-based fake billing scam impersonates PayPal using a personalized email subject, a cryptocurrency theme, and a fake payment receipt theme.

No items found.
Type:
Fake Billing Scam
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Impersonated Party:
Impersonated Brand:
PayPal
Attachment Type:
Language:
See Attack Details

Good morning,


[Impersonated Third Party Name] is respectfully requesting your company submit a proposal for the attached scope of work. You will find the scope of work and bid set plan along with specific sizing documents associated with this project, please see the link below to view bid:


REVIEW BID PROPOSAL HERE


To those who perform in multiple divisions; quotes for multiple areas of work are welcomed and encouraged. However, please provide separate estimates for each division or area of work that you plan to quote.


Should you have any questions please do not hesitate to reach out to me directly.


Thank you,


Kind regards,


[Impersonated Third Party Employee Name]

[Impersonated Third Party Employee Title]

[Impersonated Third Party Name]

Bid Proposal Credential Phishing Attack

Subject:
"
NEW BID INVITATION FROM [IMPERSONATED THIRD PARTY NAME]
"
Attack Date:
May 11, 2022

This link-based attack impersonates an external third party using an external compromised account and a bid proposal theme to steal credentials.

No items found.
Type:
Credential Phishing
Theme(s):
...
Tactic(s):
...
Vector:
Link-based
Goal:
Credential Theft
Impersonated Party:
External Party - Other
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Hi [Recipient Email Address,

This is to notify you that a payment of $701 has been made from your account. This payment was made to Coinbase Global Inc. on account of Bitcoin trading.

Find your purchase summary below.

Order ID        YHYMPNDW
Transaction ID        9367528
Recipient        Coinbase
Product        Bitcoins
Quantity        0.010304726

Amount        $701

GET SUPPORT

In case you did not authorize this payment, please contact our Support team at our helpline number provided below. If you feel your account has been breached, cancel this transaction by calling us immediately to report your issue and request a full refund.

+1(601) 724-8568

PayPal Cryptocurrency Fake Payment Receipt Fake Billing Scam

Subject:
"
[no subject]
"
Attack Date:
May 11, 2022

This text-based fake billing scam impersonates PayPal using a cryptocurrency theme and a fake payment receipt theme.

No items found.
Type:
Fake Billing Scam
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Impersonated Party:
Impersonated Brand:
PayPal
Attachment Type:
Language:
See Attack Details

Hi ,

I am reaching out to you on behalf of [Impersonated Vendor Name] concerning an outstanding payment which is long overdue with the Invoice 474864. This invoice is past due and your prompt payment is appreciated.  

Could you kindly check your records and advise accordingly?

I wait to hear from you soon

Best Regards


[Impersonated Vendor Employee Name]  
[Impersonated Vendor Employee Title]
[Impersonated Vendor Name]
[Impersonated Vendor Contact Information]

Vendor Impersonation Overdue Payment BEC Attack

Subject:
"
Outstanding Invoice
"
Attack Date:
May 11, 2022

This text-based BEC attack impersonates a vendor/supplier using a spoofed display name, a look-alike domain, and an overdue payment theme to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
External Party - Vendor/Supplier
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

I need you to complete the CHAPS/Faster payment to a vendor.
How soon can you get it done?

Regards,
[Executive Name]

Executive Impersonation Payment Fraud BEC Attack

Subject:
"
[Recipient First Name]
"
Attack Date:
May 11, 2022

This text-based BEC attack impersonates an executive using a personalized email subject, a spoofed display name, and a free webmail account to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
Employee - Executive
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Good Morning [Recipient First Name],

I got a call from my bank not quite long enough that my account will be placed on hold for some info needed from me to update it and I had to switch to a new financial institution. Can you please update my new direct deposit info for me? I would be glad if the changes can be effective for the current pay day. What Information Do You Need ?

Regards

[Impersonated Employee Name]

[Impersonated Employee Title]

[Company Name]

Employee Impersonation Payroll Diversion BEC Attack

Subject:
"
Change My Details - [Impersonated Employee Name]
"
Attack Date:
May 11, 2022

This text-based BEC attack impersonates an employee using a personalized email subject, a spoofed display name, and a free webmail account to divert payroll deposits to a fraudulent account.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payroll Diversion
Impersonated Party:
Employee - Other
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Goedemorgen ,

We moeten €14,840.70 betalen aan een bedrijf in het VK, ben je nu beschikbaar om de betaling te verwerken?

Groeten,
[Executive Name].

Dutch Executive Impersonation Payment Fraud BEC Attack

Subject:
"
Betaling
"
Attack Date:
May 11, 2022

This text-based Dutch-language BEC attack impersonates an executive using a spoofed email address and a free webmail account to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
Employee - Executive
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Dear Partner,

We kindly ask that you re-confirm to us the status of our outstanding or
any due payments if there are any, as we currently have to give you an
updated information.

Please get back to us immediately with the total amount that is
outstanding with corresponding due dates and invoices respectively.

If you need any further information, please do not hesitate to contact
me for further assistance.

Thank you for your compliance.

Kinds Regards
[Impersonated Vendor Employee Name] ([Impersonated Vendor Employee Title])
[Impersonated Vendor Company Name]

Vendor Impersonation Payment Inquiry BEC Attack

Subject:
"
INVOICE'S DUE/OPEN "UPDATE"
"
Attack Date:
May 10, 2022

This text-based BEC attack impersonates a vendor/supplier using a spoofed email address, a free webmail account, and a payment inquiry theme to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
External Party - Vendor/Supplier
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Hallo Payroll,

Ik wil de rekening op mijn Payroll wijzigen naar een nieuwe rekening
en ik zou graag willen weten of deze geldig is voor de volgende
betaling?

Bedankt

[Employee Name]
[Employee Title]

Dutch Employee Impersonation Payroll Diversion BEC Attack

Subject:
"
Salarisrekening bijgewerkt
"
Attack Date:
May 10, 2022

This text-based Dutch-language BEC attack impersonates an employee using a spoofed display name and a free webmail account to divert payroll deposits to a fraudulent account.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payroll Diversion
Impersonated Party:
Employee - Other
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Whoops.. There are no results found.