Phishing email examples pdf. Try our Phishing Simulator free for 14 days.
Phishing email examples pdf. One points to an Amazon logo.
Phishing email examples pdf Phishing Email Scams Summary: A phishing email could look real; We look at some phishing examples Use this phishing email or choose from hundreds of other phishing testing templates to test your users and identify risk in your company. Initial email and archive. Dec 5, 2023 · 3 Examples of PDF Phishing 1. • We have easily accessible policies and procedures in place in the event of a cyber security incident. Oct 18, 2024 · If you’re not sure if the email is legit, again, contact the company directly. The following phishing email examples are some of the most popular types of phishing via email/brand spoofing: Apr 8, 2021 · Phishing attacks. Jul 30, 2024 · Review the most common phishing email examples to help you identify and avoid phishing email scams. Form-based Attacks. edu> Date: Tue, Sep 19, 2023 at 2:41 PM PHISHING EXAMPLES The following messages, from the Federal Trade Commission’s OnGuardOnline, are examples of what attackers may email or text when phishing for sensitive information: "We suspect an unauthorized transaction on your account. For assistance, submit a Help request. Just like the first two cases, these PDF files don’t contain malicious code, apart from a link to a phishing site. Here is your guide to recognizing a phishing email and 7 common phishing email examples. Report an email as phishing. Phishing emails & phishing scams are dangerous. The goal of the resource is to support practitioners in Top-Clicked Phishing Email Subjects. Some of the most common fraudulent messages are non-monetary hoaxes or chain mail. But. Phishing Example #1. To see examples of actual phishing emails, and steps to take if you believe you received a phishing email, please visit . The phishing email includes an attached ZIP file, which, when extracted, reveals an SVG file. Nov 7, 2024 · A phishing awareness email is an email communication sent to employees to educate them about the risks and tactics associated with phishing attacks. M]. Jan 7, 2020 · PDF | Extended Abstract: Humans are often considered the weakest link in cybersecurity. Use the tags as effective mental triggers to recognize phishing and impersonation attempts. Survey of E-Mail Phishing Preparedness Within a Selected Group. Know what to look for before becoming prey to hackers and bad actors trying to take advantage. The study also includes a review of the relevant literature on Web Feb 15, 2021 · Download full-text PDF Read full-text. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims. Phishing emails today rarely begin with, “Salutations from the son of the deposed prince of Nigeria…” It’s often difficult to distinguish a fake email from a verified one, however most have subtle hints of their scammy nature. Below are some examples of actual phishing and scam emails received by UVA community members, in which the most common or key markers of phishing emails are indicated. However, most have subtle hints of their scammy nature. Even though we should always be skeptical of emails, that's not always the case for everyone. The table below lists the eight different phishing email examples for training that we will present in this article. In this type of scam, hackers customize their phishing emails with the target’s name, title, work phone number, and other information to trick the recipient into believing that they have a connection with the sender. Let’s look at the most common examples of phishing emails and list some of the ways to spot them. Nov 19, 2024 · The Different Types of Phishing Emails. These malicious emails landed in employee inboxes, and could pose an immediate threat to your revenue and reputation. email or other communication channels. We take information security very seriously and ask that you also be vigilant in order to prevent fraud and to help protect our common interests. Download full-text PDF. Example of a Phishing Email: Take a look at this fake Apple email: Here are the red flags that make this email suspicious: 1. The email urgently asks the victim to act and transfer funds, update employee details, or install a new app on their computer. These emails appear urgent and professional and, in this example, entice the recipient to download a malicious file. The lame ass built-in templates are so bad even the users complain. Step 8: Recognize a poorly written email – grammatical errors, misspelling and incorrect formatting. These brands are often spoofed in phishing emails because they are so common. Here are seven email phishing examples to help you recognize a malicious email and maintain email Email, due to its inexpensive nature and ease of use, is a popular method for distributing fraudulent messages to potential victims. StopRansomware. Urgent action required. This is a phishing email that pretends to be from listing@binance. " Here are seven examples of phishing awareness emails that an organization can use to educate its employees about phishing attacks. Figure 3 – Fake Apple PDF Phish. Mar 1, 2021 · PDF | This research aims to describe and analyze phishing emails. Nov 8, 2023 · Phishing emails often manipulate victims with social engineering tactics, which don’t discriminate. Although you will not be expecting the email, the fact that it apparently Jan 1, 2018 · From a dataset consisting of 2000 phishing and ham emails, a set of prominent phishing email features (identified from literature) were extracted and used by the machine learning algorithm with a The purpose of this slide to provide few examples of cyber phishing emails containing malicious links and attachments to target different organizations. Phishing scams target everyone, from individual users to businesses. Phishing emails are hard to spot, look real, and can have devastating consequences. While the email appears to come from Apple, the sender’s address ([email protected]) gives it away. If you encounter these signs, here’s a few things to do: • Don’t ignore them. Therefore, to help you with this, we have included some PowerPoint templates for creating highly effective strategies for phishing attack prevention. information by email. Subject: [EXT] RE: Introduction •A caution message appended at the end of the incoming e-mail. Two points a spoofed Amazon email address with a large amount of numbers and an unusual character. Click here: [link]. Like other files that can come as attachments or links in an email, PDF files have received their fair share of This is an example of a spear phishing email, designed to impersonate a person of authority requiring that a banking or wiring transaction be completed. PDF”. These emails attempt to fool you into visiting a bogus web site to either download malware (viruses and other software intended to compromise your computer) or reveal sensitive personal Real examples of fake emails. These emails often contain tips, examples, and guidance on how to recognize and respond to phishing attempts. Jan 18, 2024 · Common Phishing Email Scam Examples. RUN sandbox. KnowBe4 reports on the top-clicked phishing emails by subject line each quarter which include phishing test results as well as those found 'In the Wild' which are gathered from the millions of users that click on their Phish Alert Button to report real phishing emails and allow our team to analyze the results. Phishing PDF file with a logo of a prominent oil company asking the user to click on the picture. This document contains a number of resources to help you learn about the risks of email scam and teaches you how to recognize a scam email. Similar to email phishing and smishing, vishing is designed to trick victims into sharing personal information, such as PIN numbers, social security numbers, credit card security codes, passwords and other personal data. All of that mumbo-jumbo is there to try to help emails get around spam filters. Mar 21, 2024 · Phishing emails rarely include this level of personalization because it costs money to implement. Phishing is an example of Social Engineering. 3. Here’s a list of the most common phishing email examples to be aware of: Google Docs Scam. Phishing email example: "Your account will be suspended if you do not update your information immediately. Copy link Link copied. Unit 42 noted that PDF files are also an enticing phishing vector as they are cross-platform and allow attackers to engage with users, making their schemes more believable as 1. " engineering with email in a number of ways. HubSpot is a cloud-based customer relationship management (CRM), marketing, sales and content management system (CMS) operation platform. fishersci@mail. According to Microsoft, here are some of the innovative ways they’ve seen phishing attacks evolve from 2019 to 2020: Pointing email links to fake google search results that point to attacker-controlled malware-laden websites, pointing email links to non-existent pages on an attacker-controlled website so that a custom 404 page is presented that can be used to spoof logon pages for legitimate Apr 20, 2021 · The phishing email below will appear to come from someone you know, after their email account has been compromised by a hacker – Fiona Wilson, in the below example. Keep Stanford alert! Follow the instructions to forward suspicious emails to the Information Security Office. The first example of CEO fraud, a form of business email compromise (BEC), involves a request for a bank or wire transfer to pay a false invoice. Spear Phishing Phishing-Email-Examples - Free download as PDF File (. Jan 1, 2025 · Request for Quote (RFQ) phishing emails are a sophisticated scam where attackers pose as potential clients requesting quotes for services. Account Termination Threat Phish This phishing email threatens to deactivate your account unless you click the link and enter your email address and password. Here are some common types, with phishing email examples of how they might look. The act of phishing has been on the rise and evolving by the day, with malicious actors employing newer techniques to dupe regular users. In this type of attack, the phishing email or message contains a malicious PDF file that appears legitimate. Some phishing emails appear to notify you that your bank temporarily - If there is no attachment to this e-mail, speak to your network/e-mail administrator, Internet Service Provider or computer support technician to assist you in resolving possible restrictions in receiving PDF attachments. Oct 3, 2022 · An example of clone phishing is receiving an email twice, but with one of them coming from a slightly different email address. These are real-life examples that your team may encounter. Here are seven email phishing examples to help you recognize a malicious email and maintain email security. This phishing email attempts to scare you into clicking the link and then entering your email address, password and cell phone number into a phishing web form. org. In the case of phishing via text message, forward the message to the number 7726, which corresponds to ‘SPAM’ on most phone keypads. In this example, the attacker impersonates the CEO or another senior executive within the company and typically targets a member of staff within accounts payable. email 2. Oct 14, 2024 · Example of a phishing email supposedly from Docusign: in this case, the link to the phishing page is located right in the body of the email In some cases, phishers employ an additional trick we’ve covered in a separate post before: the email contains a PDF attachment with a QR code inside. • If we spot a phishing or fraudulent email, we have a clear reporting method to seek help and information. This guide is an invaluable resource to understand the different tactics of cyber criminals and assist in thwarting their attempts to obtain sensitive information. Each type of phishing email exploits specific human traits, such as trust, fear, or curiosity. Phishing Email Examples Author: wallacekelley5 Keywords: DACnCJoOwNE Created Date: 11/17/2017 8:59:29 PM Apr 11, 2016 · For example, suspicious concerns about typographical errors, grammatical errors, and website addresses in phishing emails may lead to more detailed message elaboration, resulting in systematic Phishing Email Examples PDF is a resource that provides individuals with email templates to help identify potentially dangerous or fraudulent emails. Below are the stats on the volume of various themes we have seen in these phishing campaigns. e. Abstract: This research aims to describe and analyze phishing emails. Phishing emails today rarely begin with, "Salutations from the son of the deposed Prince of Nigeria" It's becoming increasingly difficult to distinguish a fake email from a verified one. Learn how to spot a phishing email and protect yourself with Phishing Email Examples Pdf. gov. • Ensure DMARC is set to “reject” for sent emails [CPG 2. Figure 5 – Fake Adobe PDF Phish. Figure 3 shows an example of a phishing e-mail where the. Approximately 90% of all emails sent worldwide consist of spam, spoofed messages, or phishing attempts. Get powerful threat protection Download Norton 360 Deluxe for advanced cybersecurity that helps keep you safer from malicious links and other online threats. Customize the templates with names, URLs, and brands of your preference. com. Similar to other campaigns we observed, these phishing files also leveraged traffic redirection for reasons mentioned previously. An investigation report outlines how phishing emails mimic legitimate sources to deceive users, leading to potential data breaches and financial losses. What is Phishing or a Phishing email? Phishing is a type of online fraud in which a scammer uses an e-mail or website to illicitly obtain confidential information. Here are some examples of the most common types of phishing emails and what you should watch out for to identify their malicious nature. They target individuals of all ages, both in the workplace and at home. ” Vishing is the telephone version of phishing, or a voice scam. 1. Here are a few precautions to take: Aug 2, 2024 · False invoice payments. Urgent or Threatening Lesson 1: Phishing Analysis for Beginners Last Update: October 2020 Introduction Overview This is a comprehensive guide on how to investigate phishing emails, starting at the confirmation of a phishing event . Phishing can be conducted via a text message, social media, or by phone, but the term 'phishing' is mainly used to describe attacks that arrive by email. Phishing Email Examples Taking the mystery out of identifying a phishing message. Figures - uploaded by Kholoud Althobaiti Dec 30, 2019 · One of the biggest problems with the Internet technology is the unwanted spam emails. If you have any questions regarding this email notifi cation of your account change, please contact us at URL REMOVED FROM THIS EXAMPLE FOR SECURITY REASONS. If you got a phishing email, forward it to the Anti-Phishing Working Group at reportphishing@apwg. Phishing messages come in all shapes and sizes, but there are a few types of phishing emails and texts that are more common than others. • If you’re unsure of something, go to the source Thu 8/2/2018 12:15 PM Dave Sparling <dsparling. Peoples Bank EXAMPLE PHISHING EMAIL #3 From:”People’s Bank” Mar 27, 2019 · Most of us are no strangers to phishing attempts, and over the years we’ve kept you informed about the latest tricks used by attackers in the epidemic of phishing and spear-phishing campaigns that plague, in particular, email users. Sep 2, 2024 · 10 real phishing email examples You've probably seen a lot of phishing emails, some are easy to spot, and others are sneakier. Example Spam/Phishing Email Message #1 Dec 4, 2023 · Below are some of the examples: Figure 2 – Fake Amazon PDF Phish . What you need to know: Aug 23, 2024 · What is Phishing Email? A phishing email is a fraudulent message designed to trick recipients into disclosing sensitive information, such as passwords or financial details. For example, you receive two identical emails, one from “support@amazon. com> DS C) Fisher Scientific Direct Deposit To C) Finance Vendor Coordinator (D You forwarded this message on 8/2/2018 12:26 PM. See Figure 1 for an example of phishing email characteristics, which may include a combination of the following: • Suspicious URLs and/or Attachments • Unnecessary urgency • Unsolicited emails and/or Oct 21, 2020 · An example of some of the random text you might find at the end of some phishing email examples. • Example. We have seen other examples of PDF files being distributed via email and exhibiting the same characteristics. Tech support phishing emails Dec 4, 2024 · Dear: Account Owner, Our records indicate that you are enrolled in the University of California paperless W2 Program. Tips. - If there is no attachment to this e-mail, speak to your network/e-mail administrator, Internet Service Provider or computer support technician to assist you in resolving possible restrictions in receiving PDF attachments. Please review these carefully so you don't become the next victim. Form-based attacks are a common tactic used by cybercriminals in PDF phishing scams. Hackers send malicious links requesting their victim to change their M365 password. Report the phishing attempt to the FTC at ReportFraud Jan 10, 2022 · Re: Phishing Emails We have been informed that a number of our customers have received phishing emails from scammers pretending to work for Resolute Forest Products. Detecting Phishing/Spam Emails Emails with links, which display a different website or URL when hovered on or have URL with incorrect name or domain Emails presenting offers that are too attractive to believe, such as winning the lottery, a competition, a free subscription, vacation, and job offers. PHISHING EXAMPLES The following messages, from the Federal Trade Commission’s OnGuardOnline, are examples of what attackers may email or text when phishing for sensitive information: "We suspect an unauthorized transaction on your account. Some phishing emails may contain viruses Jan 26, 2017 · Other examples: Enter your email credentials to access or download your file. SIMPLE TIPS • Play hard to get with strangers. Apr 12, 2024 · By identifying phishing attacks at their early stages, firms can easily protect their precious data. Create, generate, or modify phishing email templates to suit your needs. The scammers were defeated by our company culture. We will also explore the characteristics of each example phishing attack and their real purpose and cover basic analysis with free online tools. txt) or read online for free. Report an email incorrectly marked as phishing. Here are 20 examples of phishing emails that could catch you off guard. Step 7: Lookout for emails that claim there’s a problem with payment, card, billing, login, etc. pdf), Text File (. Example Email. We are all on a first name basis in our company (including the CEO), and the email wasn't. The email contains links or URLs that direct you to the wrong website or try to get you Sep 25, 2023 · The methods of perpetrating phishing attacks have grown in sophistication, extending beyond the common email phishing to include spear phishing, whaling, clone phishing, vishing, smishing, and Sep 16, 2020 · Warning: Do not explore links or email addresses in the examples shown here as these are real-life examples. It’s important that you’re aware of these signs and are watching out for them in all your online activity. Oct 13, 2021 · Phishing emails sent to two University Lecturers in the same department on the same day. We'll also offer steps to help protect your organization from data breaches, malware infections, reputational damage, and more. As scammers find more and more innovative ways of phishing, it is vital to be aware of some common phishing techniques and ways to point them out. All small business owners and employees should be aware of the following red flags that indicate a possible phishing email: 1. Sep 29, 2023 · In this article, we'll delve into some of the most common HR phishing email examples. The link redirects to a Mar 19, 2021 · The signs of scams are right there for you to see in both of these phishing email examples. The email invites you to view a file with a generic subject like “Davey Fundraising Proposal. Summary of key phishing email examples for training concepts. Links in email and online posts are often the way cybercriminals compromise your computer. 10 phishing email examples for training: Free templates for your organisation Apr 10, 2014 · Phishing Is A Fake Email The long definition is that phishing is the act of attempting to acquire information such as usernames and passwords by masquerading as a trustworthy entity in an electronic communication. Deliver an outstanding presentation on the topic using this About Email Phishing Overview And Impact Phishing Attacks And Strategies. Types of phishing emails and texts. Tel: 852 - 800-908801 Fax: 852-301-70283 Top of the day to you, let me crave your indulgence to introduce my self to you. Let’s review some examples of the most frequently sent phishing scams: Account suspended scam. A large amount of phishing emails will blank out the To: or Cc: fields so that you cannot see that this is a mass email to a large group of people. AsyncRAT is a Remote Access Trojan used by attackers to gain unauthorized access to a victim’s system. Jan 4, 2024 · Evaluate your employees' awareness by administering phishing exercises. Here, you will find real-world recent examples of dangerous phishing emails that bypassed popular Secure Email Gateways including the newer AI model driven products. com” and the other from “supp0rt@amazon. Phishing Email Examples phishing emails target specific individuals within an organization. Key Items to Look for in Suspicious Emails. The well-disguised phishing email comes in as part of the spam and makes its entry into one's inbox quite Jan 7, 2025 · 11 phishing email examples and common warning signs. What will you do if you have an email sitting in your inbox screaming “REMINDER: Export Documents” or “REMINDER: Invoice” and the email directs you to download the attachment? This is the Cofense SEG-Miss sample database. Mildly edited to make them anonymous. Mar 14, 2022 · Phishing Email Examples Example 4 TECL Industrial Ctr, 489-499,Castle Peak Rd, Kowloon, Hong Kong. Ways to Identify Email Phishing Attack Dec 18, 2024 · The phishing emails contained either an attached Docusign-enabled PDF file or an embedded HTML link directing victims to malicious HubSpot Free Form Builder links embedded within phishing emails. On a computer, go to Gmail. Criminals send phishing emails to millions of people, asking for sensitive information (like bank details), or containing links to bad websites. Phishing Email Phishing emails are crafted to look as if they’ve been sent from a legitimate organization. The request is designed to be urgent to prompt action without thinking. Important Notice: Important restrictions, qualifications and disclaimers ("the Disclaimer") apply to this e-mail. The problem of phishing, types of message content of phishing emails, and the basic | Find, read and cite all the research you Apr 15, 2024 · What Are Some Examples of Microsoft Phishing Emails? Hackers will also embed several malicious messages within their email phishing campaign to achieve several goals, including, Hackers are executing a credential theft against the user’s M365 account. In this post we’ll look at real phishing examples, how to report phishing emails, and how to deal with phishing scams. Thank you for using Peoples Bank Online for this request. However, it is not sent from our email server although the domain is legitimate. Open the message. To ensure that your account is not compromised, please click the link below and confirm your identity. Here’s the full analysis session: View Analysis Session. Nov 22, 2022 · Employees are the weakest link to an organisation’s cybersecurity. Sender’s Email Address. It can help you to o These tools reject any incoming email that has a domain that is being spoofed when a DMARC policy of reject is enabled. 5 Examples of HR Phishing Emails & How They Work Every good real phishing email we have received have tried to impersonate a real company or person. Immediate call to action requesting payment. Because that is what phishers do. An inbound phishing email includes an active link or file (often a picture/graphic, statement, or invoice). In previous phishing attacks, the content of the PDF has been included in the body of the email. Using this phishing email example, attackers send an email claiming a Google Doc is shared with you, complete with a link. o Spoofed emails are rejected at the mail server prior to . The information you give helps fight scammers. Phishing emails come in all shapes and sizes, each designed to exploit a specific vulnerability or scenario. Your W2 is ready for viewing under Employee Self Service. The problem of phishing, types of message content of phishing emails, and the basic techniques of phishing email attacks are explained by way of introduction. Dec 17, 2018 · Download full-text PDF Read full-text. Read full-text. One points to an Amazon logo. Notice the Aug 19, 2024 · This example of a phishing attack uses an email address familiar to the victim, like the one belonging to the organization’s CEO, Human Resources Manager, or the IT support department. 5. Click Report phishing. According to the most recent phishing statistics, the most-phished brands are Google, PayPal, Apple, Yahoo!, etc. . With email phishing being rampant nowadays, here are phishing email examples for training your employees. co. com blog article "15 Examples of Phishing Emails from 2016-2017" This comprehensive guide provides up-to-date PDFs of phishing email examples to help you stay safe online. "paperless W2") is prepared and ready for viewing. Apr 5, 2021 · Figure 3 shows an example of these types of phishing PDF files: Figure 3. They identified several attack patterns as well as information examples that phishing emails often What is an Email Phishing Attack? Email phishing is a common example of social engineering that attempts torickt you, a colleague, or someone else inhte workplace into giving out information using email. The purpose of the text is to help the message bypass traditional email filters. As a result, you do not receive a paper W2 but instead receive e-mail notification that your online W2 (i. Very well written (in perfect french), pretends to comes from the CEO for a wire transfert. Then the scammer asked users to deposit crypto into their blockchain addresses. If you got a phishing text message, forward it to SPAM (7726). Phishing emails will often come with subjects that are in all capitals or have multiple exclamation marks If you’ve received a phishing email, you can forward it to the Anti-Phishing Working Group at their email address, reportphishing@apwg. A Phishing Email Example That Includes Fake Financial Documents. Here, we've assembled ten sample phishing email templates tailored to gauge the susceptibility of individuals within your organization to actual phishing attacks. Our simulated phishing platform is highly configurable, and using our HTML email editor, you can create, generate, duplicate, or modify existing phishing emails based on organizational requirements. This provides robust protection against other users receiving emails that impersonate a domain. From: IT Team <IT@goshen. Long description - Scam email #3: Order misplaced A fake email that contains different signs of phishing. Image source: edts. Spear phishing is the method of choice for criminal Sep 23, 2024 · 13 phishing email examples. signifying External: this is an e-mail originating from outside USU) is inserted at the front of the subject line. • Never click on suspicious links or respond to scam emails. However, new generative artificial intelligence (AI) capabilities could change this — giving scammers a cheap, easy way to personalize phishing emails at high volume. Figure 4 – Fake Internal Revenue Service PDF Phish. Example below of a phishing email and things to look for: Things Phishy About This Email: 1. A spear phishing aiming for my CFO (he shared the email to the rest of us as an example). Dec 30, 2021 · ANTI-PHISHING SOFTWARE Area 1 Horizon GreatHorn IronScale Cloud based service that offer protection from phishing on Email & network based vectors This cloud- native email security service protect from phishing attack on office 365, email carrying ransomware This is a self learning email security platform powered by AI. Try our Phishing Simulator free for 14 days. Example 1 “How to Spot a Phishing Email” Subject Don’t Get Hooked How to Spot a Phishing Email; Example 2 “Stay Safe Online” Subject Stay Safe Online Protect Yourself from Phishing Attacks Google may analyze these emails and attachments to help protect our users from spam and abuse. Ir para o conteúdo Dec 5, 2024 · Phishing email with archive analyzed inside ANY. Phishing Email Example 5. Tips for Spotting Phishing Emails Although phishing emails often mimic actual companies and vendors, there are ways to detect them. 2. Download citation. One way you can tell that this message is a phishing attempt is by the fact that the body of the email just contains personal information with no further context. If you got a phishing email or text message, report it. Feb 20, 2023 · Phishing emails are becoming more widespread and sophisticated. Three points to a prompt telling the user an action is needed for their account. " How to spot it: How To Report Phishing. Let us have a look at some of the most common phishing email examples to give you an idea about on how to stop phishing email. Download our phishing email examples pdf. The email appears to Aug 8, 2019 · Identify phishing emails Phishing emails are disguised to look like legitimate emails, but often have characteristics that signal a scam. The phishing email below persuaded users to contact a fake Binance staff on Telegram. Next to Reply , click More . •Phishing is popular with cybercriminals, as it is far easier to trick someone into clicking a Common Phishing Email Examples. This email message is not set up to receive reply messages.
vxt urqzxry wzeiw gdsvbl oquy eypcc wdbi ehjic wns xvywsz
{"Title":"What is the best girl
name?","Description":"Wheel of girl
names","FontSize":7,"LabelsList":["Emma","Olivia","Isabel","Sophie","Charlotte","Mia","Amelia","Harper","Evelyn","Abigail","Emily","Elizabeth","Mila","Ella","Avery","Camilla","Aria","Scarlett","Victoria","Madison","Luna","Grace","Chloe","Penelope","Riley","Zoey","Nora","Lily","Eleanor","Hannah","Lillian","Addison","Aubrey","Ellie","Stella","Natalia","Zoe","Leah","Hazel","Aurora","Savannah","Brooklyn","Bella","Claire","Skylar","Lucy","Paisley","Everly","Anna","Caroline","Nova","Genesis","Emelia","Kennedy","Maya","Willow","Kinsley","Naomi","Sarah","Allison","Gabriella","Madelyn","Cora","Eva","Serenity","Autumn","Hailey","Gianna","Valentina","Eliana","Quinn","Nevaeh","Sadie","Linda","Alexa","Josephine","Emery","Julia","Delilah","Arianna","Vivian","Kaylee","Sophie","Brielle","Madeline","Hadley","Ibby","Sam","Madie","Maria","Amanda","Ayaana","Rachel","Ashley","Alyssa","Keara","Rihanna","Brianna","Kassandra","Laura","Summer","Chelsea","Megan","Jordan"],"Style":{"_id":null,"Type":0,"Colors":["#f44336","#710d06","#9c27b0","#3e1046","#03a9f4","#014462","#009688","#003c36","#8bc34a","#38511b","#ffeb3b","#7e7100","#ff9800","#663d00","#607d8b","#263238","#e91e63","#600927","#673ab7","#291749","#2196f3","#063d69","#00bcd4","#004b55","#4caf50","#1e4620","#cddc39","#575e11","#ffc107","#694f00","#9e9e9e","#3f3f3f","#3f51b5","#192048","#ff5722","#741c00","#795548","#30221d"],"Data":[[0,1],[2,3],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[6,7],[8,9],[10,11],[12,13],[16,17],[20,21],[22,23],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[36,37],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[2,3],[32,33],[4,5],[6,7]],"Space":null},"ColorLock":null,"LabelRepeat":1,"ThumbnailUrl":"","Confirmed":true,"TextDisplayType":null,"Flagged":false,"DateModified":"2020-02-05T05:14:","CategoryId":3,"Weights":[],"WheelKey":"what-is-the-best-girl-name"}