SEG-Miss Database

This is the Cofense SEG-Miss sample database. Here, you will find real-world recent examples of dangerous phishing emails that bypassed popular Secure Email Gateways including the newer AI model driven products. These malicious emails landed in employee inboxes, and could pose an immediate threat to your revenue and reputation. Conversely, Cofense customers could rest easy because these threats we removed from their systems by Cofense solutions.

How did we see these failures?

Cofense’s Phishing Detection Center (PDC) is our email SOC as a Service that powers the email phishing mitigation and risk reduction programs for thousands of the world’s most important brands. Our network of over 35+ Million Cofense-trained employees, and our automated journaling, reports suspected threats in real-time to the PDC which powers our security platform. This database is driven by factual and verifiable data sent through our analysis process and vetted by our human team of experts - unique to Cofense. Please note: shown here are just samples of the SEG misses we observe everyday, no statistical value or patterns should be derived from this small randomized subset of data. 


Abnormal Security

Phishing Email Example Description:
Voicemail-themed emails found in environments protected by Abnormal Security and Microsoft ATP deliver Credential Phishing via an embedded URL.

Type: Credential Phishing Posted On: October 1, 2024 Tactic: Link Theme: Voicemail

Microsoft ATP

Phishing Email Example Description:
Voicemail-themed emails found in environments protected by Abnormal Security and Microsoft ATP deliver Credential Phishing via an embedded URL.

Type: Credential Phishing Posted On: October 1, 2024 Tactic: Link Theme: Voicemail

Cisco IronPort

Phishing Email Example Description:
Finance-themed emails found in environments protected by Cisco IronPort deliver an attached HTML document. The HTML document drops a malicious VBS script that downloads a PowerShell script. The PowerShell Script runs Zharkbot in memory.

Type: Zharkbot Posted On: October 1, 2024 Tactic: HTML Attachment Theme: Finance

Cisco IronPort

Phishing Email Example Description:
Finance-themed emails found in environments protected by Cisco IronPort deliver a URL Shortcut File via an embedded URL. The URL Shortcut File delivers a LNK Downloader which delivers a Malicious Batch Script which delivers a Python Installer. The Python Installer runs XWorm RAT, Venom RAT, and DcRAT.

Type: DcRAT Posted On: September 30, 2024 Tactic: Link Theme: Finance

Abnormal Security

Phishing Email Example Description:
Voicemail-themed emails found in environments protected by Abnormal Security, Microsoft ATP, and Proofpoint deliver Credential Phishing via an embedded URL.

Type: Credential Phishing Posted On: September 27, 2024 Tactic: Link Theme: Voicemail

Microsoft ATP

Phishing Email Example Description:
Voicemail-themed emails found in environments protected by Abnormal Security, Microsoft ATP, and Proofpoint deliver Credential Phishing via an embedded URL.

Type: Credential Phishing Posted On: September 27, 2024 Tactic: Link Theme: Voicemail

Proofpoint

Phishing Email Example Description:
Voicemail-themed emails found in environments protected by Abnormal Security, Microsoft ATP, and Proofpoint deliver Credential Phishing via an embedded URL.

Type: Credential Phishing Posted On: September 27, 2024 Tactic: Link Theme: Voicemail

Cisco IronPort

Phishing Email Example Description:
Taxes-themed emails found in environments protected by Cisco IronPort, Microsoft ATP, Proofpoint, and Mimecast deliver Remcos RAT via an embedded URL.

Type: Remcos RAT Posted On: September 25, 2024 Tactic: Link Theme: Tax

Proofpoint

Phishing Email Example Description:
Taxes-themed emails found in environments protected by Cisco IronPort, Microsoft ATP, Proofpoint, and Mimecast deliver Remcos RAT via an embedded URL.

Type: Remcos RAT Posted On: September 25, 2024 Tactic: Link Theme: Tax