Filters
Reset
Attack Type
Attack Vector
Attack Goal
Attack Tactic
Impersonated Party
Attachment Type
Language
Theme
Impersonated Brand
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Attack Vault

Showing
X
results

The Attack Vault contains samples of email-based cyber attacks targeting enterprise users, including business email compromise (BEC) attacks, financial supply chain fraud, credential phishing, malware attacks, and other types of scams. The email subject and body content of these samples can be searched and the repository can be filtered based on specific characteristics using the options below.

This collection of attack samples is not meant to be a comprehensive repository of all email-based threats. Rather, the Attack Vault contains a cross-section of various types of cyber threats--each containing a unique combination of tactics, themes, and/or content--to provide a general overview of some of the more notable attacks observed in today's email threat landscape.

Please print the enclosed shipment paperwork below and attach it to your shipment.

HERE

Scheduled Pickup Date and Time:
May 13, 2022
09:30 - 15:30

DHL Fake Shipping Notification Credential Phishing Attack

Subject:
"
DHL Shipment: Check Your Address Now
"
Attack Date:
May 5, 2022

This link-based attack impersonates DHL using a spoofed email address and a fake shipping notifications theme to steal credentials.

No items found.
Type:
Credential Phishing
Theme(s):
...
Tactic(s):
...
Vector:
Link-based
Goal:
Credential Theft
Impersonated Party:
Impersonated Brand:
DHL
Attachment Type:
Language:
See Attack Details

Hi
I just switched my bank and want to update my new direct deposit details, can i send you my new account info so you can help me update it now?

Regards,
[Executive First Name]

Executive Impersonation Payroll Diversion BEC Attack

Subject:
"
Paycheck Re-update
"
Attack Date:
May 5, 2022

This text-based BEC attack impersonates an executive using display name spoofing and a maliciously registered domain to divert payroll deposits to a fraudulent account.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payroll Diversion
Impersonated Party:
Employee - Executive
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

New voice message from your contacts directory at ('+1 415-322-2037) to [Recipient Name]
Dated: May 04, 2022 7.05pm
Duration: 0:32 Secs.
Play Voicenote

Unsubscribe

Fake Voicemail Credential Phishing Attack

Subject:
"
Notification - New Voice message
"
Attack Date:
May 5, 2022

This link-based attack uses a fake voicemail theme and maliciously registered domain to steal credentials.

No items found.
Type:
Credential Phishing
Theme(s):
...
Tactic(s):
...
Vector:
Link-based
Goal:
Credential Theft
Impersonated Party:
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Hi [Recipient First Name],

I need the full AP aged report on all outstanding debts we owe to our
vendors.

Note: Kindly attach all contact emails.

Regards,
[Executive First Name]

Executive Impersonation Aging Report BEC Attack

Subject:
"
Outstanding Accounts Report
"
Attack Date:
May 5, 2022

This text-based BEC attack impersonates an executive using display name spoofing and a maliciously registered domain to request a copy of an aging report.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Aging Report Theft
Impersonated Party:
Employee - Executive
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

sent you a document to review and sign.


REVIEW DOCUMENT

Dropbox Fake Document Credential Phishing Attack

Subject:
"
Secured Dropbox Documents
"
Attack Date:
May 5, 2022

This link-based attack impersonates Dropbox using a compromised external account and a fake document theme to steal credentials.

No items found.
Type:
Credential Phishing
Theme(s):
...
Tactic(s):
...
Vector:
Link-based
Goal:
Credential Theft
Impersonated Party:
Impersonated Brand:
Dropbox
Attachment Type:
Language:
See Attack Details

Hi [Recipient First Name],  

I need you to take care of something right now, so please let me know if you're free right now. I'll be in a meeting right now and won't be able to answer the phone, so it's best to contact me via email.

Regards,
[Impersonated Employee Name]

Employee Impersonation Gift Card BEC Attack

Subject:
"
PLEA
"
Attack Date:
May 5, 2022

This text-based BEC attack impersonates an employee using display name spoofing and a free webmail account to request the purchase of gift cards.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Gift Card Request
Impersonated Party:
Employee - Other
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

[Recipient First Name]

Is there any possibility that you can cut a check today for a new
vendor that did a consulting job for us? The invoice is past due
already.


[Impersonated Employee Name]
[Impersonated Employee Title]
[Impersonated Employee Company]

Employee Impersonation New Vendor Payment Fraud BEC Attack

Subject:
"
Check for a new vendor
"
Attack Date:
May 5, 2022

This text-based BEC attack impersonates an employee using display name spoofing, a free webmail account, and a new vendor theme to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
Employee - Other
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Attn: Accounts Payable Manager:

[Impersonated Vendor Company Name] greatly appreciates you as a valued customer and we want to
thank you for your continued business.

Our office will like to update our Bank Account information details you have on file

Please note, We no longer accept mailing of any check payment at this time , All payments has to go through Direct Deposit ACH payment and Wire transfer

Could you please check if you have any open invoice payable to us as accounting is still not able to get onto the server or into Oracle to review accounts or post payments that may have been received.

Thank you,

[Impersonated Vendor Employee Name]

[Impersonated Vendor Employee Title]

[Impersonated Vendor Company Contact Information]

Vendor Impersonation Account Update BEC Attack

Subject:
"
Please Advise on payment status
"
Attack Date:
May 5, 2022

This text-based BEC attack impersonates a vendor/supplier using display name spoofing, a look-alike domain, and an account update theme to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
External Party - Vendor/Supplier
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Hello


Please we want to audit/close the book of accounting for the period ended 2021 and March 2022. We would like to know if you/your company owes us any outstanding payments till date. If you do, how much is it and when is the payment due date?

Also if you have not paid yet, kindly hold off with the payment.

Your immediate response will be highly appreciated.

Kind Regards,


[Impersonated Vendor Employee Name]
Accounts Receivable
[Impersonated Vendor Company Name].

Vendor Impersonation Payment Inquiry BEC Attack

Subject:
"
Audit of Accounts
"
Attack Date:
May 5, 2022

This text-based BEC attack impersonates a vendor/supplier using a free webmail account and a payment inquiry theme to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
External Party - Vendor/Supplier
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Hi  [Recipient First Name],


I need you to make a payment today, Please let me know if you are available so I can forward you the beneficiary's details.


Regards,
[Executive Name]
[Executive Title]

Executive Impersonation Payment Fraud BEC Attack

Subject:
"
Re Instruction
"
Attack Date:
May 5, 2022

This text-based BEC attack impersonates an executive using a spoofed email address and a free webmail account to request a fraudulent payment.

No items found.
Type:
Business Email Compromise
Theme(s):
...
Tactic(s):
...
Vector:
Text-based
Goal:
Payment Fraud
Impersonated Party:
Employee - Executive
Impersonated Brand:
Attachment Type:
Language:
See Attack Details

Whoops.. There are no results found.