EXPLORE
← Back to Explore
T1598

Phishing for Information

Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Phishing for information is different from [Phishing](https://attack.mitre.org/techniques/T1566) in that the objective is gathering data from the victim rather than executing malicious code. All forms of phishing are electronically delivered social engi...

PRE
843
Detections
2
Sources
5
Threat Actors

BY SOURCE

842sublime1splunk_escu

PROCEDURES (107)

Authentication Monitoring97 detections

Auto-extracted: 97 detections for authentication monitoring

Email Security49 detections

Auto-extracted: 49 detections for email security

Impersonat38 detections

Auto-extracted: 38 detections for impersonat

Credential35 detections

Auto-extracted: 35 detections for credential

Service35 detections

Auto-extracted: 35 detections for service

Impersonat34 detections

Auto-extracted: 34 detections for impersonat

General Monitoring29 detections

Auto-extracted: 29 detections for general monitoring

Email28 detections

Auto-extracted: 28 detections for email

Credential26 detections

Auto-extracted: 26 detections for credential

Attachment25 detections

Auto-extracted: 25 detections for attachment

Attachment24 detections

Auto-extracted: 24 detections for attachment

Attachment23 detections

Auto-extracted: 23 detections for attachment

Email21 detections

Auto-extracted: 21 detections for email

Suspicious21 detections

Auto-extracted: 21 detections for suspicious

Service20 detections

Auto-extracted: 20 detections for service

Network Connection Monitoring19 detections

Auto-extracted: 19 detections for network connection monitoring

Phish18 detections

Auto-extracted: 18 detections for phish

Suspicious18 detections

Auto-extracted: 18 detections for suspicious

Suspicious16 detections

Auto-extracted: 16 detections for suspicious

Script Execution Monitoring13 detections

Auto-extracted: 13 detections for script execution monitoring

Credential12 detections

Auto-extracted: 12 detections for credential

Phish11 detections

Auto-extracted: 11 detections for phish

Impersonat11 detections

Auto-extracted: 11 detections for impersonat

Base6410 detections

Auto-extracted: 10 detections for base64

Phish9 detections

Auto-extracted: 9 detections for phish

Service8 detections

Auto-extracted: 8 detections for service

Phish8 detections

Auto-extracted: 8 detections for phish

Suspicious8 detections

Auto-extracted: 8 detections for suspicious

Service6 detections

Auto-extracted: 6 detections for service

Bypass6 detections

Auto-extracted: 6 detections for bypass

Unusual6 detections

Auto-extracted: 6 detections for unusual

Credential6 detections

Auto-extracted: 6 detections for credential

Impersonat6 detections

Auto-extracted: 6 detections for impersonat

Download6 detections

Auto-extracted: 6 detections for download

Bypass6 detections

Auto-extracted: 6 detections for bypass

Attachment5 detections

Auto-extracted: 5 detections for attachment

Cloud5 detections

Auto-extracted: 5 detections for cloud

Download5 detections

Auto-extracted: 5 detections for download

Cloud5 detections

Auto-extracted: 5 detections for cloud

Ransomware5 detections

Auto-extracted: 5 detections for ransomware

Credential4 detections

Auto-extracted: 4 detections for credential

Macro4 detections

Auto-extracted: 4 detections for macro

Obfuscat4 detections

Auto-extracted: 4 detections for obfuscat

Service4 detections

Auto-extracted: 4 detections for service

Evasion3 detections

Auto-extracted: 3 detections for evasion

Http3 detections

Auto-extracted: 3 detections for http

Api3 detections

Auto-extracted: 3 detections for api

Service3 detections

Auto-extracted: 3 detections for service

Encrypt3 detections

Auto-extracted: 3 detections for encrypt

Office3 detections

Auto-extracted: 3 detections for office

Base643 detections

Auto-extracted: 3 detections for base64

Obfuscat3 detections

Auto-extracted: 3 detections for obfuscat

Unusual2 detections

Auto-extracted: 2 detections for unusual

Attachment2 detections

Auto-extracted: 2 detections for attachment

Macro2 detections

Auto-extracted: 2 detections for macro

Download2 detections

Auto-extracted: 2 detections for download

Obfuscat2 detections

Auto-extracted: 2 detections for obfuscat

Encrypt2 detections

Auto-extracted: 2 detections for encrypt

Office2 detections

Auto-extracted: 2 detections for office

Email2 detections

Auto-extracted: 2 detections for email

Bypass2 detections

Auto-extracted: 2 detections for bypass

Bypass2 detections

Auto-extracted: 2 detections for bypass

Email2 detections

Auto-extracted: 2 detections for email

Macro2 detections

Auto-extracted: 2 detections for macro

Http2 detections

Auto-extracted: 2 detections for http

Evasion2 detections

Auto-extracted: 2 detections for evasion

Aws2 detections

Auto-extracted: 2 detections for aws

Office1 detections

Auto-extracted: 1 detections for office

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

Oauth1 detections

Auto-extracted: 1 detections for oauth

Attachment1 detections

Auto-extracted: 1 detections for attachment

Cloud1 detections

Auto-extracted: 1 detections for cloud

Credential1 detections

Auto-extracted: 1 detections for credential

Token1 detections

Auto-extracted: 1 detections for token

Masquerad1 detections

Auto-extracted: 1 detections for masquerad

Aws1 detections

Auto-extracted: 1 detections for aws

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

Inject1 detections

Auto-extracted: 1 detections for inject

Unusual1 detections

Auto-extracted: 1 detections for unusual

Inject1 detections

Auto-extracted: 1 detections for inject

Http1 detections

Auto-extracted: 1 detections for http

Api1 detections

Auto-extracted: 1 detections for api

Unusual1 detections

Auto-extracted: 1 detections for unusual

Obfuscat1 detections

Auto-extracted: 1 detections for obfuscat

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Token1 detections

Auto-extracted: 1 detections for token

Token1 detections

Auto-extracted: 1 detections for token

Bypass1 detections

Auto-extracted: 1 detections for bypass

Api1 detections

Auto-extracted: 1 detections for api

Office1 detections

Auto-extracted: 1 detections for office

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Base641 detections

Auto-extracted: 1 detections for base64

Masquerad1 detections

Auto-extracted: 1 detections for masquerad

Inject1 detections

Auto-extracted: 1 detections for inject

Oauth1 detections

Auto-extracted: 1 detections for oauth

Cloud1 detections

Auto-extracted: 1 detections for cloud

Encrypt1 detections

Auto-extracted: 1 detections for encrypt

Evasion1 detections

Auto-extracted: 1 detections for evasion

Unusual1 detections

Auto-extracted: 1 detections for unusual

Aws1 detections

Auto-extracted: 1 detections for aws

Unusual1 detections

Auto-extracted: 1 detections for unusual

Impersonat1 detections

Auto-extracted: 1 detections for impersonat

Impersonat1 detections

Auto-extracted: 1 detections for impersonat

Attachment1 detections

Auto-extracted: 1 detections for attachment

Oauth1 detections

Auto-extracted: 1 detections for oauth

Office1 detections

Auto-extracted: 1 detections for office

Impersonat1 detections

Auto-extracted: 1 detections for impersonat

DETECTIONS (843)

Abuse: Cloudflare Workers Hosted EvilTokens Domain Structure
sublimehigh
Advance Fee Fraud (AFF) from freemail provider or suspicious TLD
sublimemedium
AnonymousFox indicators
sublimehigh
Attachment with VBA macros from employee impersonation (unsolicited)
sublimehigh
Attachment: Adobe image lure in body or attachment with suspicious link
sublimemedium
Attachment: Any HTML file within archive (unsolicited)
sublimemedium
Attachment: Archive containing HTML file with file scheme link
sublimehigh
Attachment: Calendar file with invisible Unicode characters
sublimehigh
Attachment: Calendar invite from recently registered domain
sublimehigh
Attachment: Calendar invite with Google redirect and invoice request
sublimemedium
Attachment: Callback phishing solicitation via image file
sublimehigh
Attachment: Callback phishing solicitation via pdf file
sublimehigh
Attachment: Callback phishing solicitation via text-based file
sublimemedium
Attachment: Cold outreach with invitation subject and not attachment
sublimehigh
Attachment: Compensation review lure with QR code
sublimehigh
Attachment: Credit card application with WhatsApp contact
sublimemedium
Attachment: CVE-2025-24071 - Microsoft Windows File Explorer Spoofing Vulnerability
sublimecritical
Attachment: Decoy PDF author (Julie P.)
sublimehigh
Attachment: DocuSign impersonation via PDF linking to new domain
sublimemedium
Attachment: DOCX with hyperlink targeting recipient address
sublimemedium
Attachment: Double base64-encoded zip file in HTML smuggling attachment
sublimehigh
Attachment: Dropbox image lure with no Dropbox domains in links
sublimemedium
Attachment: EML containing a base64 encoded script
sublimehigh
Attachment: EML file contains HTML attachment with login portal indicators
sublimehigh
Attachment: EML file with HTML attachment (unsolicited)
sublimemedium
Attachment: EML file with IPFS links
sublimemedium
Attachment: EML with embedded Javascript in SVG file
sublimehigh
Attachment: EML with link to credential phishing page
sublimehigh
Attachment: EML with QR code redirecting to Cloudflare challenges
sublimelow
Attachment: EML with SharePoint files shared from GoDaddy federated tenants
sublimelow
Attachment: EML with Sharepoint link likely unrelated to sender
sublimemedium
Attachment: EML with suspicious indicators
sublimemedium
Attachment: Employment contract update with suspicious file naming
sublimehigh
Attachment: Encrypted PDF with credential theft body
sublimemedium
Attachment: Encrypted zip file with payment-related lure
sublimemedium
Attachment: Excel file with document sharing lure created by Go Excelize
sublimehigh
Attachment: Excel file with suspicious template identifier
sublimehigh
Attachment: Excel Web Query File (IQY)
sublimehigh
Attachment: Fake attachment image lure
sublimemedium
Attachment: Fake lawyer & sports agent identities
sublimehigh
Attachment: Fake scan-to-email
sublimemedium
Attachment: Fake secure message and suspicious indicators
sublimemedium
Attachment: Fake Slack installer
sublimehigh
Attachment: Fake voicemail via PDF
sublimemedium
Attachment: Fake Zoom installer
sublimehigh
Attachment: Fictitious invoice using LinkedIn's address
sublimemedium
Attachment: Finance themed PDF with observed phishing template
sublimemedium
Attachment: HTML attachment with Javascript location
sublimehigh
Attachment: HTML attachment with login portal indicators
sublimemedium
Attachment: HTML file contains exclusively Javascript
sublimemedium
Attachment: HTML file with excessive 'const' declarations and abnormally long timeouts
sublimehigh
Attachment: HTML file with excessive padding and suspicious patterns
sublimehigh
Attachment: HTML file with reference to recipient and suspicious patterns
sublimehigh
Attachment: HTML smuggling - QR Code with suspicious links
sublimehigh
Attachment: HTML smuggling 'body onload' linking to suspicious destination
sublimehigh
Attachment: HTML smuggling 'body onload' with high entropy and suspicious text
sublimehigh
Attachment: HTML smuggling Microsoft sign in
sublimehigh
Attachment: HTML smuggling with atob and high entropy
sublimehigh
Attachment: HTML smuggling with atob and high entropy via calendar invite
sublimehigh
Attachment: HTML smuggling with auto-downloaded file
sublimehigh
Attachment: HTML smuggling with base64 encoded JavaScript function
sublimehigh
Attachment: HTML smuggling with base64 encoded ZIP file
sublimemedium
Attachment: HTML smuggling with concatenation obfuscation
sublimehigh
Attachment: HTML smuggling with decimal encoding
sublimehigh
Attachment: HTML smuggling with embedded base64 streamed file download
sublimehigh
Attachment: HTML smuggling with embedded base64-encoded ISO
sublimehigh
Attachment: HTML smuggling with eval and atob
sublimehigh
Attachment: HTML smuggling with eval and atob via calendar invite
sublimehigh
Attachment: HTML smuggling with excessive line break obfuscation
sublimehigh
Attachment: HTML smuggling with excessive string concatenation and suspicious patterns
sublimemedium
Attachment: HTML smuggling with fromCharCode and other signals
sublimehigh
Attachment: HTML smuggling with hex strings
sublimemedium
Attachment: HTML smuggling with raw array buffer
sublimehigh
Attachment: HTML smuggling with RC4 decryption
sublimehigh
Attachment: HTML smuggling with ROT13
sublimehigh
Attachment: HTML smuggling with setTimeout
sublimehigh
Attachment: HTML smuggling with unescape
sublimehigh
Attachment: HTML with emoji-to-character map
sublimehigh
Attachment: HTML with hidden body
sublimehigh
Attachment: HTML with JavaScript functions for HTTP requests
sublimehigh
Attachment: HTML with obfuscation and recipient's email in JavaScript strings
sublimehigh
Attachment: ICS calendar with embedded file from internal sender with SPF failure
sublimehigh
Attachment: ICS file with AWS Lambda URL
sublimemedium
Attachment: ICS file with meeting prefix
sublimehigh
Attachment: ICS file with non-Gregorian calendar scale
sublimemedium
Attachment: ICS with embedded Javascript in SVG file
sublimehigh
Attachment: ICS with employee policy review lure
sublimehigh
Attachment: Invoice and W-9 PDFs with suspicious creators
sublimehigh
Attachment: Legal themed message or PDF with suspicious indicators
sublimemedium
Attachment: Link file with UNC path
sublimemedium
Attachment: Link to Doubleclick.net open redirect
sublimemedium
Attachment: Macro files containing MHT content
sublimemedium
Attachment: Malformed OLE file
sublimehigh
Attachment: Microsoft 365 credential phishing
sublimehigh
Attachment: Microsoft impersonation via PDF with link and suspicious language
sublimehigh
Attachment: Office file contains OLE relationship to credential phishing page
sublimehigh
Attachment: Office file with credential phishing URLs
sublimemedium
Attachment: Office file with document sharing and browser instruction lures
sublimehigh
Attachment: Password-protected PDF with fake document indicators
sublimemedium
Attachment: PDF bid/proposal lure with credential theft indicators
sublimemedium
Attachment: PDF contains W9 or invoice YARA signatures
sublimemedium
Attachment: PDF file with link to fake Bitcoin exchange
sublimelow
Attachment: PDF generated with wkhtmltopdf tool and default title
sublimelow
Attachment: PDF proposal with credential theft indicators
sublimehigh
Attachment: PDF with a suspicious string and single URL
sublimehigh
Attachment: PDF with credential theft language and invalid reply-to domain
sublimemedium
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
sublimemedium
Attachment: PDF with Microsoft Purview message impersonation
sublimemedium
Attachment: PDF with multistage landing - ClickUp abuse
sublimehigh
Attachment: PDF with password in filename matching body text
sublimemedium
Attachment: PDF with personal Microsoft OneNote URL
sublimemedium
Attachment: PDF with recipient email in link
sublimehigh
Attachment: PDF with ReportLab library and default metadata
sublimelow
Attachment: PDF with suspicious HeadlessChrome metadata
sublimemedium
Attachment: PDF with suspicious language and redirect to suspicious file type
sublimehigh
Attachment: PDF with suspicious link and action-oriented language
sublimehigh
Attachment: QR code link with base64-encoded recipient address
sublimehigh
Attachment: QR code with credential phishing indicators
sublimemedium
Attachment: QR code with encoded recipient targeting and redirect indicators
sublimehigh
Attachment: QR code with recipient targeting and special characters
sublimehigh
Attachment: QR code with suspicious URL patterns in EML file
sublimehigh
Attachment: QR code with userinfo portion
sublimehigh
Attachment: RDP connection file
sublimemedium
Attachment: RFC822 containing suspicious file sharing language with links from untrusted sender
sublimemedium
Attachment: RFP/RFQ impersonating government entities
sublimehigh
Attachment: RTF file with suspicious link
sublimemedium
Attachment: Self-sender PDF with minimal content and view prompt
sublimehigh
Attachment: Small text file with link containing recipient email address
sublimemedium
Attachment: Soda PDF producer with encryption themes
sublimehigh
Attachment: Suspicious employee policy update document lure
sublimemedium
Attachment: Suspicious PDF created with headless browser
sublimehigh
Attachment: SVG files with evasion elements
sublimehigh
Attachment: Uncommon compressed file
sublimelow
Attachment: USDA bid invitation impersonation
sublimemedium
Attachment: Web files with suspicious comments
sublimehigh
Attachment: XLSX file with suspicious print titles metadata
sublimehigh
BEC with unusual reply-to or return-path mismatch
sublimehigh
BEC: Employee impersonation with subject manipulation
sublimehigh
BEC/Fraud: Generic scam attempt to undisclosed recipients
sublimelow
BEC/Fraud: Penpal scam
sublimemedium
BEC/Fraud: Reply-chain manipulation with urgent keywords and self-reply
sublimemedium
BEC/Fraud: Romance scam
sublimemedium
BEC/Fraud: Student loan callback phishing
sublimemedium
BEC/Fraud: Urgent language and suspicious sending/infrastructure patterns
sublimemedium
Benefits enrollment impersonation
sublimehigh
Body HTML: Recipient SLD in HTML class
sublimemedium
Body: Embedded email headers indicative of thread hijacking/abuse
sublimemedium
Body: PayApp transaction reference pattern
sublimemedium
Brand impersonation: AARP
sublimemedium
Brand impersonation: Adobe (QR code)
sublimehigh
Brand impersonation: Adobe Sign with suspicious indicators
sublimehigh
Brand impersonation: Adobe with suspicious language and link
sublimehigh
Brand impersonation: ADP
sublimemedium
Brand impersonation: AliExpress
sublimemedium
Brand impersonation: Amazon
sublimelow
Brand impersonation: Amazon Web Services (AWS)
sublimemedium
Brand impersonation: Amazon with suspicious attachment
sublimemedium
Brand impersonation: American Express (AMEX)
sublimelow
Brand impersonation: Apple
sublimehigh
Brand impersonation: Aquent
sublimemedium
Brand impersonation: Aramco
sublimemedium
Brand impersonation: AuthentiSign
sublimemedium
Brand impersonation: Bank of America
sublimehigh
Brand impersonation: Barracuda Networks
sublimemedium
Brand impersonation: Binance
sublimemedium
Brand impersonation: Blockchain[.]com
sublimemedium
Brand impersonation: Booking.com
sublimemedium
Brand impersonation: Box file sharing service
sublimemedium
Brand impersonation: Capital One
sublimehigh
Brand impersonation: Charles Schwab
sublimemedium
Brand impersonation: Chase Bank
sublimehigh
Brand impersonation: Chase bank with credential phishing indicators
sublimemedium
Brand impersonation: Coinbase
sublimehigh
Brand impersonation: Coinbase with suspicious links
sublimemedium
Brand impersonation: Dashlane
sublimemedium
Brand impersonation: DHL
sublimelow
Brand impersonation: DigitalOcean
sublimehigh
Brand impersonation: Discord notification
sublimemedium
Brand Impersonation: Disney
sublimemedium
Brand impersonation: DocSend
sublimehigh
Brand impersonation: DocuSign
sublimehigh
Brand impersonation: DocuSign (QR code)
sublimehigh
Brand impersonation: DocuSign branded attachment lure with no DocuSign links
sublimehigh
Brand impersonation: DocuSign PDF attachment with suspicious link
sublimehigh
Brand impersonation: DocuSign with embedded QR code
sublimehigh
Brand impersonation: DoorDash
sublimemedium
Brand impersonation: Dotloop
sublimemedium
Brand impersonation: Dropbox
sublimemedium
Brand impersonation: Enbridge
sublimemedium
Brand impersonation: Evite
sublimemedium
Brand impersonation: Exodus
sublimelow
Brand impersonation: Fake DocuSign HTML table not linking to DocuSign domains
sublimemedium
Brand impersonation: Fake Fax
sublimemedium
Brand impersonation: Fastway
sublimemedium
Brand impersonation: FedEx
sublimelow
Brand impersonation: File sharing notification with template artifacts
sublimelow
Brand impersonation: FINRA
sublimemedium
Brand Impersonation: Gemini Trust Company
sublimemedium
Brand impersonation: Github
sublimehigh
Brand impersonation: GitHub with callback scam indicators
sublimemedium