EXPLORE
← Back to Explore
T1566.002

Spearphishing Link

Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, instead of attaching malicious files to the email itself, to avoid defenses that may inspect email attachments. Spearphishing may also involve social engineering techniques, such as posing as a tr...

Identity ProviderLinuxmacOSOffice SuiteSaaSWindows
837
Detections
4
Sources
43
Threat Actors

BY SOURCE

799sublime27elastic9splunk_escu2sigma

PROCEDURES (126)

Authentication Monitoring95 detections

Auto-extracted: 95 detections for authentication monitoring

Email Security44 detections

Auto-extracted: 44 detections for email security

Impersonat38 detections

Auto-extracted: 38 detections for impersonat

Credential35 detections

Auto-extracted: 35 detections for credential

Impersonat34 detections

Auto-extracted: 34 detections for impersonat

Email32 detections

Auto-extracted: 32 detections for email

Service30 detections

Auto-extracted: 30 detections for service

General Monitoring28 detections

Auto-extracted: 28 detections for general monitoring

Credential26 detections

Auto-extracted: 26 detections for credential

Attachment23 detections

Auto-extracted: 23 detections for attachment

Attachment23 detections

Auto-extracted: 23 detections for attachment

Email22 detections

Auto-extracted: 22 detections for email

Suspicious20 detections

Auto-extracted: 20 detections for suspicious

Attachment20 detections

Auto-extracted: 20 detections for attachment

Network Connection Monitoring19 detections

Auto-extracted: 19 detections for network connection monitoring

Service19 detections

Auto-extracted: 19 detections for service

Phish18 detections

Auto-extracted: 18 detections for phish

Suspicious15 detections

Auto-extracted: 15 detections for suspicious

Suspicious14 detections

Auto-extracted: 14 detections for suspicious

Credential12 detections

Auto-extracted: 12 detections for credential

Script Execution Monitoring11 detections

Auto-extracted: 11 detections for script execution monitoring

Phish11 detections

Auto-extracted: 11 detections for phish

Impersonat11 detections

Auto-extracted: 11 detections for impersonat

Base6410 detections

Auto-extracted: 10 detections for base64

Service8 detections

Auto-extracted: 8 detections for service

Phish8 detections

Auto-extracted: 8 detections for phish

Bypass7 detections

Auto-extracted: 7 detections for bypass

Phish7 detections

Auto-extracted: 7 detections for phish

Unusual6 detections

Auto-extracted: 6 detections for unusual

Credential6 detections

Auto-extracted: 6 detections for credential

Suspicious6 detections

Auto-extracted: 6 detections for suspicious

Impersonat6 detections

Auto-extracted: 6 detections for impersonat

Bypass6 detections

Auto-extracted: 6 detections for bypass

Download5 detections

Auto-extracted: 5 detections for download

Cloud5 detections

Auto-extracted: 5 detections for cloud

Obfuscat5 detections

Auto-extracted: 5 detections for obfuscat

Powershell4 detections

Auto-extracted: 4 detections for powershell

Api4 detections

Auto-extracted: 4 detections for api

Cloud4 detections

Auto-extracted: 4 detections for cloud

Attachment4 detections

Auto-extracted: 4 detections for attachment

Credential4 detections

Auto-extracted: 4 detections for credential

Macro4 detections

Auto-extracted: 4 detections for macro

Service3 detections

Auto-extracted: 3 detections for service

Ransomware3 detections

Auto-extracted: 3 detections for ransomware

Base643 detections

Auto-extracted: 3 detections for base64

Service3 detections

Auto-extracted: 3 detections for service

Office3 detections

Auto-extracted: 3 detections for office

Obfuscat3 detections

Auto-extracted: 3 detections for obfuscat

Download3 detections

Auto-extracted: 3 detections for download

Service3 detections

Auto-extracted: 3 detections for service

Email3 detections

Auto-extracted: 3 detections for email

Office3 detections

Auto-extracted: 3 detections for office

Download3 detections

Auto-extracted: 3 detections for download

Azure3 detections

Auto-extracted: 3 detections for azure

Evasion2 detections

Auto-extracted: 2 detections for evasion

Attachment2 detections

Auto-extracted: 2 detections for attachment

Encrypt2 detections

Auto-extracted: 2 detections for encrypt

Macro2 detections

Auto-extracted: 2 detections for macro

Office2 detections

Auto-extracted: 2 detections for office

Obfuscat2 detections

Auto-extracted: 2 detections for obfuscat

Office2 detections

Auto-extracted: 2 detections for office

Http2 detections

Auto-extracted: 2 detections for http

Bypass2 detections

Auto-extracted: 2 detections for bypass

Bypass2 detections

Auto-extracted: 2 detections for bypass

Download2 detections

Auto-extracted: 2 detections for download

Oauth2 detections

Auto-extracted: 2 detections for oauth

Token2 detections

Auto-extracted: 2 detections for token

Macro2 detections

Auto-extracted: 2 detections for macro

Http2 detections

Auto-extracted: 2 detections for http

Command Line Monitoring2 detections

Auto-extracted: 2 detections for command line monitoring

Evasion2 detections

Auto-extracted: 2 detections for evasion

Exfiltrat2 detections

Auto-extracted: 2 detections for exfiltrat

Child Process2 detections

Auto-extracted: 2 detections for child process

Aws2 detections

Auto-extracted: 2 detections for aws

Cloud1 detections

Auto-extracted: 1 detections for cloud

Credential1 detections

Auto-extracted: 1 detections for credential

Token1 detections

Auto-extracted: 1 detections for token

Masquerad1 detections

Auto-extracted: 1 detections for masquerad

Http1 detections

Auto-extracted: 1 detections for http

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

Inject1 detections

Auto-extracted: 1 detections for inject

Obfuscat1 detections

Auto-extracted: 1 detections for obfuscat

Token1 detections

Auto-extracted: 1 detections for token

Bypass1 detections

Auto-extracted: 1 detections for bypass

Inject1 detections

Auto-extracted: 1 detections for inject

Oauth1 detections

Auto-extracted: 1 detections for oauth

Unusual1 detections

Auto-extracted: 1 detections for unusual

Child Process1 detections

Auto-extracted: 1 detections for child process

Api1 detections

Auto-extracted: 1 detections for api

Unusual1 detections

Auto-extracted: 1 detections for unusual

Encrypt1 detections

Auto-extracted: 1 detections for encrypt

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Child Process1 detections

Auto-extracted: 1 detections for child process

Evasion1 detections

Auto-extracted: 1 detections for evasion

Process Creation Monitoring1 detections

Auto-extracted: 1 detections for process creation monitoring

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Base641 detections

Auto-extracted: 1 detections for base64

Api1 detections

Auto-extracted: 1 detections for api

Persist1 detections

Auto-extracted: 1 detections for persist

Oauth1 detections

Auto-extracted: 1 detections for oauth

Oauth1 detections

Auto-extracted: 1 detections for oauth

Masquerad1 detections

Auto-extracted: 1 detections for masquerad

Unusual1 detections

Auto-extracted: 1 detections for unusual

Unusual1 detections

Auto-extracted: 1 detections for unusual

Http1 detections

Auto-extracted: 1 detections for http

Cloud Monitoring1 detections

Auto-extracted: 1 detections for cloud monitoring

Remote1 detections

Auto-extracted: 1 detections for remote

Persist1 detections

Auto-extracted: 1 detections for persist

Email1 detections

Auto-extracted: 1 detections for email

Bypass1 detections

Auto-extracted: 1 detections for bypass

Cloud1 detections

Auto-extracted: 1 detections for cloud

Remote1 detections

Auto-extracted: 1 detections for remote

Unusual1 detections

Auto-extracted: 1 detections for unusual

Aws1 detections

Auto-extracted: 1 detections for aws

Impersonat1 detections

Auto-extracted: 1 detections for impersonat

Encrypt1 detections

Auto-extracted: 1 detections for encrypt

Impersonat1 detections

Auto-extracted: 1 detections for impersonat

Attachment1 detections

Auto-extracted: 1 detections for attachment

Office1 detections

Auto-extracted: 1 detections for office

Attachment1 detections

Auto-extracted: 1 detections for attachment

Impersonat1 detections

Auto-extracted: 1 detections for impersonat

Aws1 detections

Auto-extracted: 1 detections for aws

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

Oauth1 detections

Auto-extracted: 1 detections for oauth

Inject1 detections

Auto-extracted: 1 detections for inject

DETECTIONS (837)

Abuse: Cloudflare Workers Hosted EvilTokens Domain Structure
sublimehigh
Adobe branded PDF file linking to a password-protected file from untrusted sender
sublimehigh
Advance Fee Fraud (AFF) from freemail provider or suspicious TLD
sublimemedium
AnonymousFox indicators
sublimehigh
Attachment with VBA macros from employee impersonation (unsolicited)
sublimehigh
Attachment: Adobe image lure in body or attachment with suspicious link
sublimemedium
Attachment: Any HTML file within archive (unsolicited)
sublimemedium
Attachment: Archive containing HTML file with file scheme link
sublimehigh
Attachment: Calendar file with invisible Unicode characters
sublimehigh
Attachment: Calendar invite with Google redirect and invoice request
sublimemedium
Attachment: Compensation review lure with QR code
sublimehigh
Attachment: Credit card application with WhatsApp contact
sublimemedium
Attachment: CVE-2025-24071 - Microsoft Windows File Explorer Spoofing Vulnerability
sublimecritical
Attachment: Decoy PDF author (Julie P.)
sublimehigh
Attachment: DocuSign impersonation via PDF linking to new domain
sublimemedium
Attachment: DOCX with hyperlink targeting recipient address
sublimemedium
Attachment: Double base64-encoded zip file in HTML smuggling attachment
sublimehigh
Attachment: Dropbox image lure with no Dropbox domains in links
sublimemedium
Attachment: EML containing a base64 encoded script
sublimehigh
Attachment: EML file contains HTML attachment with login portal indicators
sublimehigh
Attachment: EML file with HTML attachment (unsolicited)
sublimemedium
Attachment: EML file with IPFS links
sublimemedium
Attachment: EML with embedded Javascript in SVG file
sublimehigh
Attachment: EML with link to credential phishing page
sublimehigh
Attachment: EML with QR code redirecting to Cloudflare challenges
sublimelow
Attachment: EML with SharePoint files shared from GoDaddy federated tenants
sublimelow
Attachment: EML with Sharepoint link likely unrelated to sender
sublimemedium
Attachment: EML with suspicious indicators
sublimemedium
Attachment: Encrypted PDF with credential theft body
sublimemedium
Attachment: Encrypted zip file with payment-related lure
sublimemedium
Attachment: Excel file with document sharing lure created by Go Excelize
sublimehigh
Attachment: Excel file with suspicious template identifier
sublimehigh
Attachment: Excel Web Query File (IQY)
sublimehigh
Attachment: Fake attachment image lure
sublimemedium
Attachment: Fake lawyer & sports agent identities
sublimehigh
Attachment: Fake scan-to-email
sublimemedium
Attachment: Fake secure message and suspicious indicators
sublimemedium
Attachment: Fake Slack installer
sublimehigh
Attachment: Fake voicemail via PDF
sublimemedium
Attachment: Fake Zoom installer
sublimehigh
Attachment: Fictitious invoice using LinkedIn's address
sublimemedium
Attachment: Finance themed PDF with observed phishing template
sublimemedium
Attachment: HTML attachment with Javascript location
sublimehigh
Attachment: HTML attachment with login portal indicators
sublimemedium
Attachment: HTML file contains exclusively Javascript
sublimemedium
Attachment: HTML file with excessive 'const' declarations and abnormally long timeouts
sublimehigh
Attachment: HTML file with excessive padding and suspicious patterns
sublimehigh
Attachment: HTML file with reference to recipient and suspicious patterns
sublimehigh
Attachment: HTML smuggling - QR Code with suspicious links
sublimehigh
Attachment: HTML smuggling 'body onload' linking to suspicious destination
sublimehigh
Attachment: HTML smuggling 'body onload' with high entropy and suspicious text
sublimehigh
Attachment: HTML smuggling Microsoft sign in
sublimehigh
Attachment: HTML smuggling with atob and high entropy
sublimehigh
Attachment: HTML smuggling with atob and high entropy via calendar invite
sublimehigh
Attachment: HTML smuggling with auto-downloaded file
sublimehigh
Attachment: HTML smuggling with base64 encoded JavaScript function
sublimehigh
Attachment: HTML smuggling with base64 encoded ZIP file
sublimemedium
Attachment: HTML smuggling with concatenation obfuscation
sublimehigh
Attachment: HTML smuggling with decimal encoding
sublimehigh
Attachment: HTML smuggling with embedded base64-encoded ISO
sublimehigh
Attachment: HTML smuggling with eval and atob
sublimehigh
Attachment: HTML smuggling with eval and atob via calendar invite
sublimehigh
Attachment: HTML smuggling with excessive line break obfuscation
sublimehigh
Attachment: HTML smuggling with excessive string concatenation and suspicious patterns
sublimemedium
Attachment: HTML smuggling with fromCharCode and other signals
sublimehigh
Attachment: HTML smuggling with hex strings
sublimemedium
Attachment: HTML smuggling with raw array buffer
sublimehigh
Attachment: HTML smuggling with RC4 decryption
sublimehigh
Attachment: HTML smuggling with ROT13
sublimehigh
Attachment: HTML smuggling with setTimeout
sublimehigh
Attachment: HTML smuggling with unescape
sublimehigh
Attachment: HTML with emoji-to-character map
sublimehigh
Attachment: HTML with hidden body
sublimehigh
Attachment: HTML with JavaScript functions for HTTP requests
sublimehigh
Attachment: HTML with obfuscation and recipient's email in JavaScript strings
sublimehigh
Attachment: ICS calendar with embedded file from internal sender with SPF failure
sublimehigh
Attachment: ICS file with AWS Lambda URL
sublimemedium
Attachment: ICS file with meeting prefix
sublimehigh
Attachment: ICS file with non-Gregorian calendar scale
sublimemedium
Attachment: ICS with embedded Javascript in SVG file
sublimehigh
Attachment: ICS with employee policy review lure
sublimehigh
Attachment: Invoice and W-9 PDFs with suspicious creators
sublimehigh
Attachment: Legal themed message or PDF with suspicious indicators
sublimemedium
Attachment: Link file with UNC path
sublimemedium
Attachment: Link to Doubleclick.net open redirect
sublimemedium
Attachment: Macro files containing MHT content
sublimemedium
Attachment: Malformed OLE file
sublimehigh
Attachment: Microsoft 365 credential phishing
sublimehigh
Attachment: Microsoft impersonation via PDF with link and suspicious language
sublimehigh
Attachment: Office file contains OLE relationship to credential phishing page
sublimehigh
Attachment: Office file with credential phishing URLs
sublimemedium
Attachment: Office file with document sharing and browser instruction lures
sublimehigh
Attachment: Password-protected PDF with fake document indicators
sublimemedium
Attachment: PDF bid/proposal lure with credential theft indicators
sublimemedium
Attachment: PDF contains W9 or invoice YARA signatures
sublimemedium
Attachment: PDF file with link to fake Bitcoin exchange
sublimelow
Attachment: PDF generated with wkhtmltopdf tool and default title
sublimelow
Attachment: PDF proposal with credential theft indicators
sublimehigh
Attachment: PDF with a suspicious string and single URL
sublimehigh
Attachment: PDF with credential theft language and invalid reply-to domain
sublimemedium
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
sublimemedium
Attachment: PDF with Microsoft Purview message impersonation
sublimemedium
Attachment: PDF with multistage landing - ClickUp abuse
sublimehigh
Attachment: PDF with password in filename matching body text
sublimemedium
Attachment: PDF with personal Microsoft OneNote URL
sublimemedium
Attachment: PDF with recipient email in link
sublimehigh
Attachment: PDF with ReportLab library and default metadata
sublimelow
Attachment: PDF with suspicious HeadlessChrome metadata
sublimemedium
Attachment: PDF with suspicious language and redirect to suspicious file type
sublimehigh
Attachment: PDF with suspicious link and action-oriented language
sublimehigh
Attachment: QR code link with base64-encoded recipient address
sublimehigh
Attachment: QR code with credential phishing indicators
sublimemedium
Attachment: QR code with encoded recipient targeting and redirect indicators
sublimehigh
Attachment: QR code with recipient targeting and special characters
sublimehigh
Attachment: QR code with suspicious URL patterns in EML file
sublimehigh
Attachment: QR code with userinfo portion
sublimehigh
Attachment: RDP connection file
sublimemedium
Attachment: RFC822 containing suspicious file sharing language with links from untrusted sender
sublimemedium
Attachment: RFP/RFQ impersonating government entities
sublimehigh
Attachment: RTF file with suspicious link
sublimemedium
Attachment: Self-sender PDF with minimal content and view prompt
sublimehigh
Attachment: Small text file with link containing recipient email address
sublimemedium
Attachment: Soda PDF producer with encryption themes
sublimehigh
Attachment: Suspicious employee policy update document lure
sublimemedium
Attachment: Suspicious PDF created with headless browser
sublimehigh
Attachment: SVG files with evasion elements
sublimehigh
Attachment: Uncommon compressed file
sublimelow
Attachment: USDA bid invitation impersonation
sublimemedium
Attachment: Web files with suspicious comments
sublimehigh
Attachment: XLSX file with suspicious print titles metadata
sublimehigh
Azure AD Device Code Authentication
splunk_escu
BEC with unusual reply-to or return-path mismatch
sublimehigh
BEC: Employee impersonation with subject manipulation
sublimehigh
BEC/Fraud: Generic scam attempt to undisclosed recipients
sublimelow
BEC/Fraud: Job scam fake thread or plaintext pivot to freemail
sublimemedium
BEC/Fraud: Penpal scam
sublimemedium
BEC/Fraud: Reply-chain manipulation with urgent keywords and self-reply
sublimemedium
BEC/Fraud: Romance scam
sublimemedium
BEC/Fraud: Scam lure with freemail pivot
sublimelow
BEC/Fraud: Student loan callback phishing
sublimemedium
BEC/Fraud: Urgent language and suspicious sending/infrastructure patterns
sublimemedium
Benefits enrollment impersonation
sublimehigh
Body HTML: Recipient SLD in HTML class
sublimemedium
Body: Embedded email headers indicative of thread hijacking/abuse
sublimemedium
Body: PayApp transaction reference pattern
sublimemedium
Brand impersonation: AARP
sublimemedium
Brand impersonation: Adobe (QR code)
sublimehigh
Brand impersonation: Adobe Sign with suspicious indicators
sublimehigh
Brand impersonation: Adobe with suspicious language and link
sublimehigh
Brand impersonation: ADP
sublimemedium
Brand impersonation: AliExpress
sublimemedium
Brand impersonation: Amazon
sublimelow
Brand impersonation: Amazon Web Services (AWS)
sublimemedium
Brand impersonation: Amazon with suspicious attachment
sublimemedium
Brand impersonation: American Express (AMEX)
sublimelow
Brand impersonation: Apple
sublimehigh
Brand impersonation: Aquent
sublimemedium
Brand impersonation: Aramco
sublimemedium
Brand impersonation: AuthentiSign
sublimemedium
Brand impersonation: Bank of America
sublimehigh
Brand impersonation: Barracuda Networks
sublimemedium
Brand impersonation: Binance
sublimemedium
Brand impersonation: Blockchain[.]com
sublimemedium
Brand impersonation: Booking.com
sublimemedium
Brand impersonation: Box file sharing service
sublimemedium
Brand impersonation: Capital One
sublimehigh
Brand impersonation: Charles Schwab
sublimemedium
Brand impersonation: Chase Bank
sublimehigh
Brand impersonation: Chase bank with credential phishing indicators
sublimemedium
Brand impersonation: Coinbase
sublimehigh
Brand impersonation: Coinbase with suspicious links
sublimemedium
Brand impersonation: Dashlane
sublimemedium
Brand impersonation: DHL
sublimelow
Brand impersonation: DigitalOcean
sublimehigh
Brand impersonation: Discord notification
sublimemedium
Brand Impersonation: Disney
sublimemedium
Brand impersonation: DocSend
sublimehigh
Brand impersonation: DocuSign
sublimehigh
Brand impersonation: DocuSign (QR code)
sublimehigh
Brand impersonation: DocuSign branded attachment lure with no DocuSign links
sublimehigh
Brand impersonation: DocuSign PDF attachment with suspicious link
sublimehigh
Brand impersonation: DocuSign with embedded QR code
sublimehigh
Brand impersonation: DoorDash
sublimemedium
Brand impersonation: Dotloop
sublimemedium
Brand impersonation: Dropbox
sublimemedium
Brand impersonation: Enbridge
sublimemedium
Brand impersonation: Evite
sublimemedium
Brand impersonation: Exodus
sublimelow
Brand impersonation: Fake DocuSign HTML table not linking to DocuSign domains
sublimemedium
Brand impersonation: Fake Fax
sublimemedium
Brand impersonation: Fastway
sublimemedium
Brand impersonation: FedEx
sublimelow
Brand impersonation: File sharing notification with template artifacts
sublimelow
Brand impersonation: FINRA
sublimemedium
Brand Impersonation: Gemini Trust Company
sublimemedium
Brand impersonation: Github
sublimehigh
Brand impersonation: GitHub with callback scam indicators
sublimemedium
Brand impersonation: GoDaddy
sublimemedium
Brand Impersonation: Google (QR Code)
sublimehigh
Brand impersonation: Google Careers
sublimehigh