EXPLORE

EXPLORE DETECTIONS

🔍
992 detections found

Open redirect: typedrawers.com

Detects messages containing links or QR codes pointing to typedrawers.com/home/leaving with target parameter, sent from non-trusted domains or authenticated sources failing DMARC checks. Considers sender reputation and requires either unsolicited contact or prior malicious activity without false positives.

T1566T1566.001T1566.002T1598T1036+1
Sublimemedium

Open redirect: U.S. Antarctic Program Data Center (USAP-DC)

Message contains use of the U.S. Antarctic Program Data Center (USAP-DC) open redirect.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimemedium

Open redirect: unitedwaynwvt.org

Message contains use of the unitedwaynwvt.org open redirect. This has been exploited in the wild.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimemedium

Open redirect: ust.hk

Message contains use of the ust.hk open redirect. This has been exploited in the wild.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimemedium

Open redirect: vconfex.com

Message contains use of the vconfex.com redirect. This has been exploited in the wild.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimemedium

Open redirect: VK

Message contains use of the VK open redirect, but the sender is not VK. This has been exploited in the wild.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimemedium

Open redirect: weblinkconnect.com

Message contains use of the weblinkconnect.com open redirect, but the sender is not weblinkconnect.com. This has been exploited in the wild.

T1566T1566.001T1566.002T1598T1036+1
Sublimemedium

Open redirect: whitefox.pl

Message contains use of the whitefox.pl open redirect. This has been exploited in the wild.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimemedium

Open redirect: Xfinity CMP Redirection to Google AMP

Detects when non-Xfinity senders abuse Xfinity's CMP redirection service to reach Google AMP pages. The rule specifically looks for targetURL parameters containing Google AMP paths in links from untrusted or previously malicious senders.

T1566T1566.001T1566.002T1598T1036+1
Sublimemedium

Open redirect: xfinity.com

Message contains use of the xfinity.com open redirect. This has been exploited in the wild.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimemedium

Open redirect: YouTube

Looks for use of the YouTube open redirect coming from someone other than YouTube.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimemedium

Open redirect: YouTube --> Google Redirection Chain

Message contains use of a redirect chain which involves YouTube and Google amp. This has been exploited in the wild.

T1566T1566.001T1566.002T1598
Sublimemedium

Outbound message to disposable email provider

Possible exfiltration of sensitive information or files.

Sublimelow

Outlook hyperlink bypass: left-to-right mark (LRM) in base HTML tag

The exploit involves tricking Outlook for Windows into displaying a fake domain while opening another one. This is achieved by adding a <base> HTML tag with a fake domain and a left-to-right mark (Unicode U+200E). Links within <a> tags will display the fake domain but open the actual domain when clicked on.

T1566T1566.001T1566.002T1598T1036+3
Sublimemedium

PayPal invoice abuse

A fraudulent invoice/receipt found in the body of the message sent by exploiting Paypal's invoicing service. Callback Phishing is an attempt by an attacker to solicit the victim (recipient) to call a phone number. The resulting interaction could lead to a multitude of attacks ranging from Financial theft, Remote Access Trojan (RAT) Installation or Ransomware Deployment.

T1566.002T1534T1656T1566.003T1598+3
Sublimemedium

PDF attachment with Google (AE) redirecting to a php or zip file

Detects a PDF attachment with a link that contains a Google.ae redirect URL.

T1566.001T1204.002T1486
Sublimehigh

PhaaS: Impact Solutions (Impact Vector Suite)

Identifies the use of the Impact Solutions PhaaS. Impact Vector Suite is a full-spectrum payload delivery platform, engineered for stealth-optimized execution across all major deployment vectors.

T1566T1566.001T1566.002T1598T1036+1
Sublimemedium

PHP Mailer with common phishing attachments

Mail coming from a PHP Mailer user agent that includes attachments with commonly used names in phishing campaigns

T1566T1566.001T1566.002T1598
Sublimemedium

Potential prompt injection attack in body HTML

Detects messages containing references to major AI tools (like Gemini, Copilot, ChatGPT, or Claude) in non-standard HTML elements.

T1566.003T1598T1566T1566.001T1566.002+7
Sublimehigh

Privatelayer VPS in Headers

The message was sent using a Privatelayer VPS, a provider known to be used for phishing.

Sublimelow

Proofpoint Security Awareness phishing simulation

Identifies phishing simulations sent by Proofpoint and excludes the message from live analysis.

Sublime

Punycode sender domain

The sender's domain contains punycode, a technique used by attackers to impersonate legitimate domains.

T1566T1566.001T1566.002T1598T1204.002+4
Sublimehigh

QR code to auto-download of a suspicious file type (unsolicited)

A QR code in the body of the email downloads a suspicious file type (or embedded file) such as an LNK, JS, or VBA. Recursively explodes auto-downloaded files within archives to detect these file types.

T1566.001T1204.002T1486T1036T1027+2
Sublimehigh

QR Code with suspicious indicators

This rule flags messages with QR codes in attachments when there are three or fewer attachments. If no attachments are present, the rule captures a screenshot of the message for analysis. Additional triggers include: sender's name containing the recipient's SLD, recipient's email mentioned in the body, an empty message body, a suspicious subject, or undisclosed recipients.

T1566T1566.001T1566.002T1598
Sublimehigh
PreviousPage 34 of 42Next