Latest Email Attack Simulations
THREAT KNOWLEDGE BASE
Case studies of email-based attacks publicly disclosed in 2025-2026 — covering kill chain, email signals, Vigilyx detection modules and mitigation. Suitable for analyst training and red-/blue-team exercises.
Case studies of email-based attacks publicly disclosed in 2025-2026, sourced from CISA, Microsoft Threat Intelligence, Mandiant, Proofpoint, Cisco Talos, FBI IC3, Sophos, and Abnormal Security. Each case follows the same template.
All samples are sanitized and intended only for security research, detection evaluation, and anti-phishing training.
Case index
ClickFix / Fake CAPTCHA payload delivery
Fake CAPTCHA tricks the user into pasting PowerShell, bypassing attachment scans.
Storm-2372 device-code phishing
Abuses Microsoft OAuth device-code flow — victim authorizes the attacker on the real login page.
Quishing / QR-code phishing
QR images carry the phishing URL, bypassing classic link detection.
HTML text cloaking & homoglyph evasion
Zero-width chars + HTML entities + display:none make every keyword regex miss.
HTML smuggling for ransomware loaders
HTML attachments rebuild the binary inside the browser via JavaScript Blob URLs.
Tycoon 2FA / EvilProxy AiTM phishing
Man-in-the-middle proxy steals session cookies in real time — MFA bypassed.
VEC vendor account takeover (BEC)
Invoice fraud sent from a real vendor mailbox — DMARC/SPF all pass.
TOAD callback phishing
Plain-text email lures the victim to call a fake hotline; agent then walks them into RMM install or OAuth device code.
Interactive animations
Every case study embeds a play/pause/step attack-chain animation. The animation auto-detects the active VitePress locale, so switching between English and 简体中文 swaps every step label. The final step always shows what Vigilyx detected and how it intervened.
Vigilyx detection coverage
Every case study ends with a Vigilyx detection coverage section that maps the attack technique to specific engine modules and source files. These are not marketing promises, they are real code paths with unit-test coverage that you can verify in the GitHub repo.
Update cadence
- Major events (CISA alerts, Microsoft blogs, public APT reports) added within a week
- Existing cases get an "Update log" section appended when significant new attribution or IOC information is published
- Old cases are kept as long-term reference material rather than deleted
