Detection.FYI
open-menu closeme
  • Link: Personal SharePoint with invalid recipients and credential theft language

    calendar Jan 23, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages with undisclosed or invalid recipients containing a single link to a personal SharePoint domain (with '-my' pattern) and high-confidence credential theft language in short message body.


    Read More
  • Brand impersonation: File sharing notification with template artifacts

    calendar Jan 23, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating file sharing services that contain template artifacts such as placeholder comments, incomplete HTML elements, and development remnants. The message includes 'shared with you' language and exhibits multiple indicators of being generated from a malicious template including HTML comments with development terms, broken anchor tags, and filename elements that closely match the subject line.


    Read More
  • Link: Tycoon2FA phishing kit (non-exhaustive)

    calendar Jan 23, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links utilizing the Tycoon2FA phishing kit, identified by specific DOM structure patterns and CDN characteristics, combined with suspicious domain indicators such as free subdomain hosts or suspicious TLDs. As the Tycoon2FA kit is evolving, this rule will not detect all variants of Tycoon2FA phishing, and is designed to compliment existing and future detections.


    Read More
  • Service abuse: Adobe legitimate domain with document approval language

    calendar Jan 23, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects messages from Adobe's legitimate email domain containing suspicious language about document or payment approval that may indicate service abuse.


    Read More
  • Extortion / sextortion (untrusted sender)

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects extortion and sextortion attempts by analyzing the email body text from an untrusted sender.


    Read More
  • Link: Suspicious URL with recipient targeting and special characters

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing links with special characters in the path that include the recipient's email address in either the URL path or fragment, potentially encoded in base64. The URLs have a simple path structure and may end with suspicious patterns.


    Read More
  • BEC/Fraud: Romance scam

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    This rule detects messages attempting to initiate a Romance scam. The rule leverage tells such as undisclosed recipients, freemail emails in the body and common scam phrasing. Romance scams are deceptive schemes where scammers establish false romantic intentions towards individuals to gain their trust and eventually exploit them financially.


    Read More
  • Fake voicemail notification (untrusted sender)

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    This rule detects a common credential phishing vector enticing the user to engage with links under the premise that they have a voicemail to retrieve. The rule looks for voicemail verbiage in the display name, body, subject or a combination of those elements with emojis or a medium to high credential theft NLU Intent from first-time + unsolicited sender.


    Read More
  • Service abuse: Microsoft Power BI callback scam

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects callback scam content sent from the legitimate Microsoft Power BI service email address, indicating potential service abuse to distribute fraudulent callback solicitations.


    Read More
  • Brand impersonation: Dropbox

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of Dropbox, a file sharing service.


    Read More
  • Callback phishing in body or attachment (untrusted sender)

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects callback scams by analyzing text within images of receipts or invoices from untrusted senders.


    Read More
  • Callback phishing via calendar invite

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects calendar invites containing callback phishing language in the DESCRIPTION of the invite.


    Read More
  • Brand impersonation: AuthentiSign

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating AuthentiSign through display name, domain, subject, or body content that either originate from non-AuthentiSign or spoofed domains.


    Read More
  • Attachment: PDF with recipient email in link

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects PDF attachments that contain the recipient's domain in the filename and include a single link personalized with the recipient's email address, either in the URL directly, encoded in base64, or within a QR code.


    Read More
  • Attachment: Password-protected PDF with fake document indicators

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects PDF attachments that are password protected and matching YARA signatures looking for specific content observed in previous activity.


    Read More
  • Brand impersonation: Blockchain[.]com

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of Blockchain[.]com, usually for credential theft.


    Read More
  • Attachment: QR code with recipient targeting and special characters

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages with QR code in attachments containing special characters in the path that include the recipient's email address in either the URL path or fragment, potentially encoded in base64. The URLs have a simple path structure and may end with suspicious patterns.


    Read More
  • Attachment: Invoice and W-9 PDFs with suspicious creators

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing two PDF attachments where one has invoice-related naming patterns and another contains W-9 tax form indicators, with at least one PDF generated by Chrome or wkhtmltopdf tools, commonly used in business email compromise attacks targeting financial processes.


    Read More
  • Link: Display text with excessive right-to-left mark characters

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links where the display text contains a high concentration of Unicode right-to-left mark characters (U+200F), which may be used to obfuscate or manipulate the visual representation of the link text to deceive recipients.


    Read More
  • Link: Self-sent message with quarterly document review request

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages sent from a user to themselves containing a link with quarterly indicators (q1_, q2_, q3_, q4_) and specific document review language requesting urgent feedback.


    Read More
  • Job scam with specific salary pattern

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects job scam content that includes specific weekly salary mentions (e.g., '$XXX weekly' patterns) in either the current email thread or previous thread conversations, while excluding legitimate income verification services.


    Read More
  • Brand impersonation: Fake Fax

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing fax-related language and notification elements from senders outside of known legitimate fax service providers.


    Read More
  • Link: Excessive URL rewrite encoders

    calendar Jan 21, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects URLs with many (excessive) encoding patterns, including multiple instances of the same encoder or four or more distinct encoders. These techniques are commonly used to obfuscate malicious URLs and evade security filters.


    Read More
  • Brand impersonation: USPS

    calendar Jan 20, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of the United States Postal Service.


    Read More
  • Impersonation: Internal corporate services

    calendar Jan 20, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects phishing attempts that impersonate corporate services such as HR, helpdesk, and benefits, using specific language in the subject or sender's name and containing suspicious links from low-reputation or mass-mailing domains.


    Read More
  • Link: Breely link masquerading as PDF

    calendar Jan 16, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing a single Breely link that displays as a PDF file. Typically, redirects to a different destination for malicious purposes.


    Read More
  • Brand impersonation: Xodo Sign

    calendar Jan 16, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating Xodo Sign with 'Processed by Xodo Sign' text from unauthorized senders that fail DMARC authentication.


    Read More
  • Service abuse: GetAccept callback scam content

    calendar Jan 16, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects callback scam language in messages sent through legitimate GetAccept infrastructure, indicating potential abuse of the service for fraudulent solicitation.


    Read More
  • BEC: Employee impersonation with subject manipulation

    calendar Jan 16, 2026  ·
    Share on: twitter facebook linkedin copy

    Subject matches the display name of someone in your organization, and the body resembles a BEC attack.


    Read More
  • Request for Quote or Purchase (RFQ|RFP) with suspicious sender or recipient pattern

    calendar Jan 15, 2026  ·
    Share on: twitter facebook linkedin copy

    RFQ/RFP scams involve fraudulent emails posing as legitimate requests for quotations or purchases, often sent by scammers impersonating reputable organizations. These scams aim to deceive recipients into providing sensitive information or conducting unauthorized transactions, often leading to financial loss, or data leakage.


    Read More
  • Brand impersonation: Quickbooks

    calendar Jan 15, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of the Quickbooks service from Intuit.


    Read More
  • Spam: Commonly observed formatting of unauthorized free giveaways

    calendar Jan 14, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects commonly observed formatting of unauthorized giveaways, free tools, and products by multiple different brands.


    Read More
  • Link: Common hidden directory observed

    calendar Jan 13, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Links in the message point to sensitive system directories like .git, .env, or .well-known that could expose confidential configuration data or system files. Actors will often abuse these directories to hide credential phishing landing pages of compromised sites.


    Read More
  • Subject: Suspicious bracketed reference

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages with subject lines containing bracketed patterns that follow a specific format with repeated characters, numeric sequences, and structured tracking identifiers commonly used in malicious automated messaging systems.


    Read More
  • Brand impersonation: SendGrid

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects inbound messages that impersonate Twilio/SendGrid through display name or domain manipulation, combined with security or authentication-themed content, while failing authentication checks and originating from untrusted sources.


    Read More
  • Vendor impersonation: Thread hijacking with typosquat domain

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects potential thread hijacking where the sender uses a domain similar to known senders, exhibits BEC behavior, and shows signs of compromised thread continuity through domain spoofing or thread manipulation.


    Read More
  • Attachment soliciting user to enable macros

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively scans files and archives to detect documents that ask the user to enable macros, including if that text appears within an embedded image.


    Read More
  • Attachment with auto-executing macro (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attachment from an unsolicited sender contains a macro that will auto-execute when the file is opened.

    Macros are a common phishing technique used to deploy malware.


    Read More
  • Attachment with auto-opening VBA macro (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively scans files and archives to detect embedded VBA files with an auto open exec.


    Read More
  • Attachment with high risk VBA macro (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Potentially malicious attachment containing a VBA macro. Oletools categorizes the macro risk as 'high'.


    Read More
  • Attachment with macro calling executable

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively scans files and archives to detect embedded VBA files with an encoded hex string referencing an exe.

    This may be an attempt to heavily obfuscate an execution through Microsoft document.


    Read More
  • Attachment with VBA macros from employee impersonation (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attachment contains a VBA macro from a sender your organization has never sent an email to.

    Sender is using a display name that matches the display name of someone in your organization.

    VBA macros are a common phishing technique used to deploy malware.


    Read More
  • Attachment: .csproj with suspicious commands

    calendar Jan 12, 2026 · Suspicious attachment  ·
    Share on: twitter facebook linkedin copy

    Attached .csproj file contains suspicious commands.


    Read More
  • Attachment: 7z Archive Containing RAR File

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects 7z archive attachments that contain RAR files, which may be used to evade detection by nesting compressed file formats.


    Read More
  • Attachment: Any HTML file within archive (unsolicited)

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Recursively scans archives to detect HTML files from unsolicited senders.

    HTML files can be used for HTML smuggling and embedded in archives to evade detection.


    Read More
  • Attachment: Archive containing disallowed file type

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Recursively scans archives to detect disallowed file types. File extensions can be detected within password-protected archives.

    Attackers often embed malicious files within archives to bypass email gateway controls.


    Read More
  • Attachment: Archive with pdf, txt and wsf files

    calendar Jan 12, 2026 · Malfam: QakBot  ·
    Share on: twitter facebook linkedin copy

    Detects a known Qakbot delivery method, zip file with pdf, txt and wsf file at a depth of 1


    Read More
  • Attachment: Calendar file with invisible Unicode characters

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects calendar (.ics) attachments containing suspicious invisible Unicode characters, which may be used to hide malicious content or bypass security filters. The rule triggers on messages with calendar-related keywords in the subject or body.


    Read More
  • Attachment: Callback phishing solicitation via image file

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    A fraudulent invoice/receipt found in an image attachment. Callback Phishing is an attempt by an attacker to solicit the victim (recipient) to call a phone number. The resulting interaction could lead to a multitude of attacks ranging from Financial theft, Remote Access Trojan (RAT) Installation or Ransomware Deployment.


    Read More
  • Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability

    calendar Jan 12, 2026 · CVE-2021-40444  ·
    Share on: twitter facebook linkedin copy

    Attachment contains an external relationship that attempts to load a remote OLE object, consistent with use in CVE-2021-40444.

    On September 7, 2021, Microsoft released details about a zero day RCE vulnerability in MSHTML that affects Microsoft Windows.

    According to Microsoft: "we are aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents. An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine."


    Read More
  • Attachment: CVE-2023-21716 - Microsoft Office Remote Code Execution Vulnerability

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attachment contains an RTF file with a font table defining an excessive number of fonts, used to exploit CVE-2023-21716.


    Read More
  • Attachment: DocuSign impersonation via PDF linking to new domain

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    This rule detects PDF files containing a DocuSign logo linking to a newly created domain (Less than or equal to 3 days)


    Read More
  • Attachment: Embedded Javascript in SVG file

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Javascript inside SVG files can be used to smuggle malicious payloads or execute scripts.


    Read More
  • Attachment: Embedded VBScript in MHT file (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    MHT files can be used to run VBScript, which can run malicious code.


    Read More
  • Attachment: EML containing a base64 encoded script

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attached EML contains a base64 encoded script in the message body.


    Read More
  • Attachment: EML file contains HTML attachment with login portal indicators

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attached EML file contains an HTML attachment with suspicious login indicators. Known credential theft technique.


    Read More
  • Attachment: EML with Encrypted ZIP

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects when an EML file is attached that contains an encrypted ZIP file. The encryption can be used to bypass security scanning and deliver malicious content.


    Read More
  • Attachment: EML with suspicious indicators

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attached EML contains suspicious indicators, such as a missing sender email or short HTML body.


    Read More
  • Attachment: Encrypted Microsoft Office file (unsolicited)

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Encrypted OLE2 (eg Microsoft Office) attachment from an unsolicited sender. Attachment encryption is a common technique used to bypass malware scanning products. Use if receiving encrypted attachments is not normal behavior in your environment.


    Read More
  • Attachment: Excel file with suspicious template identifier

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects Excel attachments containing a specific template identifier (TM16390866) in the EXIF metadata, which may indicate malicious or suspicious document templates being used to distribute harmful content.


    Read More
  • Attachment: Fake secure message and suspicious indicators

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Body contains language resembling credential theft, and an attached "secure message" from an untrusted sender.


    Read More
  • Attachment: File execution via Javascript

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Javascript contains identifiers or strings that may attempt to execute files.


    Read More
  • Attachment: Filename containing Unicode right-to-left override character

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively identifies attachments that attempt to conceal their true file extension by using right-to-left override characters


    Read More
  • Attachment: HTML attachment with login portal indicators

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively scans files and archives to detect indicators of login portals implemented in HTML files. This is a known credential theft technique used by threat actors.


    Read More
  • Attachment: HTML file contains exclusively Javascript

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attached HTML file does not contain any HTML other than a