EXPLORE

EXPLORE DETECTIONS

🔍
986 detections found

Free subdomain link with credential theft indicators

Message contains a suspicious Recipients pattern, a link that uses a free subdomain provider, and has credential theft language on the linked page.

T1566T1566.001T1566.002T1598
Sublimehigh

Free subdomain link with login or captcha (untrusted sender)

Message contains a link that uses a free subdomain provider, and has a login or captcha on the page.

T1566T1566.001T1566.002T1598
Sublimemedium

Generic service abuse from newly registered domain

Detects messages from services that write the true sender to the reply-to field, where the sender has no prior legitimate message history and is newly registered. Indicative of service abuse.

T1566.002T1534T1656T1566.003T1598+4
Sublimehigh

Google Accelerated Mobile Pages (AMP) abuse

This rule is designed to identify phishing attempts abusing Google AMP's URL structure for malicious activities. The rule aims to detect specific URL patterns, further analyzing both message content, as well as the destination of the link to distinguish between legitimate Google AMP pages and potential malicious usage.

T1566T1566.001T1566.002T1598T1204.002+2
Sublimemedium

Google Drive abuse: Credential phishing link

This rule detects legitimate Google Drive shares that link to files on Google Drive that host credential phishing content. The file is usually a PDF that impersonates a legitimate brand, with credential theft language, and a button or link to an external site that steals login credentials.

T1566T1566.001T1566.002T1598T1598.003
Sublimehigh

Google Drive direct download link from unsolicited sender

This rule detects Google Drive links that use the direct download URL pattern which automatically downloads files when clicked. This pattern is frequently used by threat actors to distribute malware. The links are formatted like: drive.google.com/uc?id=FILE_ID&export=download These links skip the preview page and immediately download the file to the user's device, which can be dangerous for recipients. Threat actors exploit this pattern to directly distribute malware while appearing to share legitimate content from a trusted service.

T1566.001T1204.002T1486T1566T1566.002+3
Sublimemedium

Google Notification alert link from non-Google sender

This rule detects messages that leverage a link to notifications.google.com not from google and from an untrusted sender. Commonly abused in salesforce phishing campaigns.

T1566T1566.001T1566.002T1598
Sublimemedium

Google presentation open redirect phishing

Detects emails containing links to Google Document Presentations that either have a single page with a single external link, have been removed for Terms of Service violations, or have been deleted.

T1566T1566.001T1566.002T1598T1036+1
Sublimemedium

Google services using g.co shortlinks

Identifies messages from authenticated Google domains containing g.co shortened URLs with a subdomain in either the message body links or thread text.

T1566T1566.001T1566.002T1598T1036+1
Sublimemedium

Google share notification with suspicious comments

This detection rule matches on messages which contain suspicious language within the comments of a Google share notification. Suspicious content within the comments section of the notification is deemed as email abbreviations such as FW:, FWD:, and RE: or by containing words that reference a file share.

T1566T1566.001T1566.002T1598T1534
Sublimehigh

Hardbacon infrastructure abuse

Hardbacon is a defunct Canadian budgeting app. Attackers have been observed using their marketing platform to send credential phishing messages.

T1566T1566.001T1566.002T1598T1036+2
Sublimehigh

Headers: Fake in-reply-to with wildcard sender and missing thread context

Detects messages claiming to be replies with In-Reply-To headers but lacking previous thread context, sent from addresses containing multiple wildcard characters in the local part.

T1566.002T1534T1656T1566T1566.001+3
Sublimehigh

Headers: Invalid recipient domain with mismatched reply-to from new sender

Message sent to an invalid recipient domain with a reply-to address that differs from the sender address, originating from a new sender.

T1566.002T1534T1656T1566T1566.001+3
Sublimemedium

Headers: iOS/iPadOS mailer with invalid build number

Detects emails claiming to be sent from an iOS or iPadOS device that contain an invalid build number.

T1566.002T1534T1656T1566T1566.001+5
Sublimemedium

Headers: Outlook Express mailer

Detects emails claiming to be sent from Outlook Express, which is a legacy email client that is no longer supported or commonly used.

T1566.002T1534T1656T1566T1566.001+5
Sublimemedium

Headers: risky-recover-production message ID

Detects messages containing 'risky-recover-production' in the message ID header, which may indicate suspicious or malicious activity.

T1566T1036T1027
Sublimelow

Headers: System account impersonation with empty sender address

Detects messages with an empty sender email address and a display name impersonating system accounts like mailer-daemon, postmaster, or administrator, but lacking legitimate bounce back content as determined by natural language processing.

T1566.002T1534T1656T1566T1566.001+1
Sublimemedium

Headers: Zimbra mailer from a non-supported OS version

Detects Zimbra originated emails sent from non-supported Windows versions. Observed in widespread HTML credential phishing campaigns.

Sublimemedium

Honorific greeting BEC attempt with sender and reply-to mismatch

Detects generic BEC/Fraud scams by analyzing text within the email body from mismatched senders with other suspicious indicators.

T1566.002T1534T1656T1566T1598
Sublimelow

HoxHunt phishing simulation

Identifies phishing simulations sent by HoxHunt and excludes the message from live analysis.

Sublime

HR impersonation via e-sign agreement comment

This rule inspects messages originating from legitimate e-signature platform infrastructure, with engaging language in the body that matches HR Impersonation criteria.

T1566.002T1534T1656T1566T1566.001+4
Sublimehigh

HTML smuggling containing recipient email address

HTML attachment (or HTML attachment in attached email) is small and contains a recipients email address.

T1566T1566.001T1566.002T1598T1204.002+4
Sublimemedium

HTML smuggling with atob in message body

Detects if the email body HTML contains the document write or insertAdjacentHTML method and atob function call. This technique has been observed leading to credential phishing.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimehigh

HTML: Bidirectional (BIDI) HTML override with right to left obfuscation

Body HTML contains multiple instances of right-to-left (RTL) text direction override markup, which can be used to visually manipulate text display and potentially bypass common strings checks.

T1566.002T1534T1656T1566T1566.001+4
Sublimemedium
PreviousPage 21 of 42Next