Facebook Support Team impersonation
“Immediate Response REquired: Facebook Ad Account Policy”
Hox rating: ★★✩✩
Threat type: Advanced campaign
Payload: Malicious link
Region: Global
Date: 06.11.2023
This phishing email is impersonating the Facebook Support Team.
It informs the user that their Ad Account broke Facebook’s Advertising Policies.
The recipient is urged to click the link to sort out the situation.

Analyst: Minna Herlevi
Google Forms phishing email
“Congratulations! You've Won a Special Gift”
Hox rating: ★★✩✩
Threat type: Bulk phishing
Payload: Malicious link
Region: Global
Date: 06.11.2023
This email comes from Google Forms and is used to send a malicious message.
The form claims that the recipient won a recent giveaway and is asked to give personal information to receive their gift.
The ‘Click Me’ link—both in the email and the form—leads to a malicious website.

Analyst: Siiri Latola
Verizon impersonation
“***Verizon Wireless: You missed a call from [PHONENUMBER], at 9:07:54 AM GmT”
Hox rating: ★★✩✩
Threat type: Bulk phishing
Payload: Malicious link
Region: Global
Date: 06.11.2023
This email tries to trick the recipient into thinking they’ve missed a phone call and there’s a voicemail they need to listen to.
But, the link leads to a malicious website.
![Verizon impersonation “***Verizon Wireless: You missed a call from [PHONENUMBER], at 9:07:54 AM GmT”](https://assets-global.website-files.com/6130a9118b1be9aebe2c2837/654e3387183e50d096833859_WEEK45-3.png)
Analyst: Sampo Lenkola
Zoom impersonation
“Zoom meeting”
Hox rating: ★★★✩
Threat type: Advanced campaign
Payload: Malicious link
Region: Nordics
Date: 06.11.2023
This phishing email tries to get the recipient’s credentials by sending a Zoom meeting link, which is actually a link to a credential harvester.
The email is visually quite genuine, and the whole campaign is a relatively new approach to phishing.

Analyst: Wivi Koenkytö
Simmons & Simmons law firm impersonation
“Unpaid invoice #5566843”
Hox rating: ★★✩✩
Threat type: Bulk phishing
Payload: Pretext
Region: Europe
Date: 06.11.2023
In this email, the attacker is impersonating an employee of the international law firm Simmons & Simmons.
This message aims to get the recipient concerned about an unpaid invoice and answer the phishing email.

Analyst: Wivi Koenkytö
McAfee vulnerability impersonation
“Your PC is at risk 17/08/2023”
“Uw pc loopt gevaar 17/08/2023”
Hox rating: ★✩✩✩
Threat type: Bulk phishing
Payload: Malicious link
Region: The Netherlands
Date: 06.11.2023
This email impersonates McAfee, claiming that the recipient needs to renew their subscription by clicking the red button.
There’s a great sense of urgency, as the email claims that if the subscription isn’t renewed in 48 hours, the account will be closed, and the recipient’s PC will be left unprotected.

Analyst: Siiri Latola
UPC Swiss telecommunications impersonation
“We invite you to request a refund”
“Wir laden Sie ein, Rückerstattung zu beantragen”
Hox rating: ★★★✩
Threat type: Advanced campaign
Payload: Malicious link
Region: Switzerland, Europe
Date: 06.11.2023
This phishing email tries to get the recipient’s credentials by claiming they’ve paid an invoice twice and asking them to request a refund by clicking the link.
This link actually leads to a malicious, credential-harvesting website.

Analyst: Wivi Koenkytö
HR department impersonation
“2023 DEC Annual Leave Compliance”
Hox rating: ★★✩✩
Threat type: Bulk phishing
Payload: Malicious link
Region: Europe
Date: 06.11.2023
This phishing email tries to trigger the recipient to click the link by claiming that it includes important information about the annual employee holidays.
The link leads to a malicious credential-harvesting site.

Analyst: Wivi Koenkytö
Sharebox impersonation
“Sharebox Notification”
Hox rating: ★★★✩
Threat type: Advanced campaign
Payload: Malicious link
Region: Europe
Date: 08.11.2023
This phishing email impersonates Sharebox to get the user to review a work-related document.
This is actually a link to a credential-harvesting website.

Analyst: Wivi Koenkytö
McAfee payment impersonation
“Detailed Alert: Review Your Latest Transaction”
Hox rating: ★★★✩
Threat type: Advanced campaign
Payload: Malicious phone number
Region: Global
Date: 09.11.2023
In this phishing email, the attacker tries to get the recipient to call the malicious phone number by claiming that the recipient has renewed their subscription to a McAfee product.
The email is stylized so that it looks like a representative of McAfee has sent it.

Analyst: Wivi Koenkytö
Fake Outlook storage notification
“Your mailbox is 100% full”
Hox rating: ★★✩✩
Threat type: Bulk phishing
Payload: Malicious link
Region: Global
Date: 09.11.2023
This email impersonates Outlook. The email suggests that the user can no longer receive messages because their mailbox is full.
With this, the attacker tries to trigger a sense of urgency in the victim.
The email also claims that to fix the problem, the user should go to the Outlook storage portal from the link. The link then leads the user to a credential harvester.

Analyst: Kaarlo Mahlberg
QuickBooks impersonation
“Payment Success: Your Plan Has Been Renewed Successfully”
Hox rating: ★✩✩✩
Threat type: Bulk phishing
Payload: Malicious phone number
Region: Global
Date: 09.11.2023
This email is trying to impersonate QuickBooks. The email claims that the recipient’s plan was renewed.
Then, the email says that if the recipient didn’t authorize the transaction, they could get the subscription refunded by calling the malicious phone number.

Analyst: Kaarlo Mahlberg
Meta Facebook impersonation
“Urgent: Temporary Account Restriction Due to Exploitation Concerns”
Hox rating: ★★★✩
Threat type: Advanced campaign
Payload: Malicious link
Region: Global
Date: 10.11.2023
The email is impersonating Meta and Facebook’s Business Help Center. It claims that the recipient’s account is temporarily restricted due to attempted exploitation concerns.
For additional information and support about the restrictions, there’s a button that's supposed to lead to the Help Center’s live chat.
But after clicking the button, it leads to a really realistic fake Meta Business Help Center page that asks for personal information.

Analyst: Kaarlo Mahlberg
Keep up with the threat feed
Don’t miss the next threat feed, and subscribe to our newsletter for the latest feed and cybersecurity content. Stay informed and stay safe!