Saw something suspicious?

If you’ve received a phishing email, found a fake account claiming to be Averrow, or spotted a lookalike domain — send it to us. We triage every report and take action on every confirmed abuse case.

Phishing Email
Suspicious message claiming to be from Averrow, your bank, or any other brand. Forward it as an attachment so we get the full headers.
  • Forward as attachment (preserves headers & SPF/DKIM)
  • Or paste the full source if forwarding isn’t possible
  • Don’t click links or open attachments first
phishing@averrow.ca
Brand Impersonation
Fake social account, lookalike domain, or website pretending to be a brand. Include as much identifying info as you can.
  • Full URL or social handle (e.g. @brandname_support)
  • Screenshots of the impersonating profile or site
  • The brand being impersonated
abuse@averrow.ca
Counterfeit or Fraud
Counterfeit storefronts, fake invoices, fraud schemes using a brand’s name. Same intake as impersonation — we route internally.
  • URL of the counterfeit listing or storefront
  • Invoice or message text if you have it
  • Brand affected and any payment instructions sent to you
abuse@averrow.ca

Every report goes through the same three steps.

Fully automated. You’ll get an acknowledgment within seconds and a determination within an hour.

Step 01
Instant acknowledgment
Within seconds you receive an email confirming we got your submission, with a tracking reference for any follow-up.
Step 02
Deep inspection
The Averrow platform extracts indicators (URLs, sender headers, sending IP, payload signatures), classifies the message, and correlates it against our threat-intel feeds. Typically completes within the hour.
Step 03
Determination email
You receive a follow-up with our verdict — malicious content discovered, or we believe it’s safe — plus confidence and any action we’ve taken (IOCs into platform intel, takedown evidence, partner signal).
We don’t share your details. Your email address and any personal information in the body stay internal to Averrow’s analyst team. Indicators (URLs, domains, sender IPs, file hashes) may be shared with platform partners and threat-intel feeds to help with takedowns.