EXPLORE DETECTIONS
Open redirect: McGill University
Message contains use of McGill University's open redirect but the sender is not McGill University.
Open redirect: Medium
Message contains use of the Medium open redirect. This has been exploited in the wild.
Open redirect: Meta --> YouTube Redirection Chain
Message contains use of a redirect chain which involves Meta and YouTube. This has been exploited in the wild.
Open redirect: mindmixer.com
Message contains use of the mindmixer.com redirect. This has been exploited in the wild for phishing.
Open redirect: MSN
Message uses an MSN open redirect. Sample (benign) redirect to sublimesecurity[.]com: https[:]//www[.]msn[.]com/en-gb/lifestyle/rf-best-products-uk/redirect?url=aHR0cHM6Ly93d3cuc3VibGltZXNlY3VyaXR5LmNvbQ==
Open redirect: museepicassoparis.fr
Message contains use of the museepicassoparis.fr open redirect. This has been exploited in the wild.
Open redirect: Nested Doubleclick.net
Doubleclick.net link leveraging a nested doubleclick.net open redirect from a new or outlier sender. The unusual behavior of nesting a doubleclick URL inside another doubleclick link warrants increasing the severity of this rule.
Open redirect: Newegg
Message contains use of the Newegg open redirect, but the sender is not Newegg. This has been exploited in the wild.
Open redirect: next2.io
Message contains use of a next.io redirect. This redirection has been abused by threat actors in the wild.
Open redirect: nowlifestyle.com
Message contains use of the nowlifestyle.com open redirect. This has been exploited in the wild.
Open redirect: obunsha.co.jp
Detects messages containing Obunsha's passnavi redirect service that can be exploited to redirect users to malicious sites. This has been used in phishing campaigns.
Open redirect: Panera Bread
Looks for use of the Panera Bread open redirect coming from someone other than Panera.
Open redirect: people.anuneo.com
Message contains use of a people.anuneo.com redirect. This redirection has been abused by threat actors in the wild.
Open redirect: phoenixartstudio.net
Message contains use of the Phoenix Art Studio redirect. This has been exploited in the wild.
Open redirect: PIRL San Diego
Message contains use of the PIRL San Diego open redirect. This has been exploited in the wild.
Open redirect: plasticsurgery.or.kr
Message contains use of the plasticsurgery.or.kr open redirect. This has been exploited in the wild.
Open redirect: pmifunds.com
Message contains use of the pmifunds.com redirect. This has been exploited in the wild.
Open redirect: predictiveresponse.net
Message contains use of the predictiveresponse.net open redirect. This has been exploited in the wild.
Open redirect: PremierBet
Message contains use of the PremierBet open redirect. This has been exploited in the wild.
Open redirect: qrxtech.com
Message contains use of the qrxtech.com open redirect. This has been exploited in the wild.
Open redirect: queue.swytchbike.com
Message contains use of the queue.swytchbike.com open redirect. This has been exploited in the wild.
Open redirect: radiopublic.com
Message contains use of the radiopublic.com redirect. This has been exploited in the wild.
Open redirect: retailrocket.net
Message contains use of the retailrocket.net open redirect. This has been exploited in the wild.
Open redirect: ringaraja.net
Message contains use of the ringaraja.net open redirect. This has been exploited in the wild.