Fake WeTransfer / file-sharing download phishing — impersonates WeTransfer, Smash, Hightail, FileMail, or Transfernow claiming someone sent the victim a file, with a download link that requires Microsoft 365 or Google credential sign-in; Vade Secure 2023–2024: WeTransfer impersonation phishing up 400%; Cofense 2024: file-sharing lures used in 23% of enterprise phishing attacks
fake-wetransfer-file-sharing-download-phish
What this tier means
High-confidence threat indicator — phishing, impersonation, BEC, or scam pattern. Strong contributor to the trash decision.
How Gorganizer detects this
Phishing emails impersonating WeTransfer, Smash, Hightail, FileMail, or Transfernow claiming that someone sent the victim a file ready for download — with a download link that leads to a fake Microsoft 365 or Google credential-harvest page. Key facts: (1) Vade Secure 2023–2024: WeTransfer impersonation phishing surged 400%, exploiting the fact that victims regularly receive legitimate WeTransfer links and trust the pattern — the conditioning makes recipients click without verifying the sender domain; Cofense 2024: file-sharing lures were used in 23% of enterprise phishing attacks, making it the second most common phishing lure category after invoice fraud; (2) The attack chain is deceptively simple: the email looks like a routine file-transfer notification from a colleague or client, the "download" button redirects through a URL shortener or tracking proxy to a Microsoft 365 / Google login page, and after the victim enters credentials the phishing page completes the redirect to a benign file — so victims never realize they were phished; (3) The required "sign in to download" step is the specific red flag: legitimate WeTransfer, Hightail, and Smash file transfers almost never require the recipient to log in — files are downloaded directly via a public link without any account credentials; (4) The attack disproportionately targets corporate users: file-sharing phishing templates often include a real sender name, professional subject line, and plausible business context ("Design files from [Agency]", "Q4 budget from [CFO]") that slip past content filters. Warning signs: sender domain not wetransfer.com, hightail.com, smash.com, or filemail.com; download requires Microsoft / Google / Office 365 sign-in; no reference to which specific file was sent; download link expires in an unusually short window.
False-positive guard
Every signal in Gorganizer feeds a multi-module score — never a sole verdict. This is a threat-tier signal — it adds a strong contribution to the trash score. The full pipeline still requires convergence across multiple modules + a margin over the safety floor before deletion happens, and Gmail's trash (30-day recovery) is always used — never permanent delete.
About the scoring engine
Gorganizer's scoring engine emits over 1,800 signals across six modules — headers, sender, subject, body, attachments, and structural metadata. Every email is scored by every module independently; the final verdict requires multiple modules to agree and the trash score to beat the safety floor by a margin.
Sacred safety guards — never delete starred emails, replies, calendar invites, receipts/invoices, or attachments — apply unconditionally regardless of any signal.
Ready to clean your inbox?
Gorganizer scans your Gmail with this signal and 1,800+ others, then cleans everything in one click. $4.99 one-time, no subscription.
Get started