Detection.FYI
open-menu closeme
  • Attachment: Self-sender PDF with minimal content and view prompt

    calendar Feb 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages where the sender and recipient are the same address with a PDF attachment containing only 'VIEW PDF' text and a standardized body message requesting to view the attachment.


    Read More
  • Brand impersonation: Dropbox

    calendar Feb 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of Dropbox, a file sharing service.


    Read More
  • Brand impersonation: TikTok

    calendar Feb 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating TikTok through similar display names or logo detection, combined with security-themed content and authentication failures. Excludes legitimate TikTok communications and trusted senders.


    Read More
  • Open redirect: embluemail.com

    calendar Feb 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Message contains use of the embluemail.com redirect. This has been exploited in the wild.


    Read More
  • Link: PDF filename impersonation with credential theft language

    calendar Feb 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages where the link display text mimics a PDF filename containing the sender's domain name, combined with credential theft language or suspicious requests. The message is sent to an invalid recipient address or to the sender themselves, indicating potential abuse of email infrastructure.


    Read More
  • Brand impersonation: Google Meet with malicious link

    calendar Feb 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages with 'Join with Google Meet' display text that redirects to domains other than meet.google.com.


    Read More
  • Callback Phishing via Zoom comment

    calendar Feb 11, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects callback scams sent through legitimate Zoom infrastructure that impersonate well-known brands like McAfee, Norton, or PayPal. These messages contain purchase or support-related language along with phone numbers, attempting to trick recipients into calling fraudulent support lines.


    Read More
  • PayPal invoice abuse

    calendar Feb 11, 2026  ·
    Share on: twitter facebook linkedin copy

    A fraudulent invoice/receipt found in the body of the message sent by exploiting Paypal's invoicing service. Callback Phishing is an attempt by an attacker to solicit the victim (recipient) to call a phone number. The resulting interaction could lead to a multitude of attacks ranging from Financial theft, Remote Access Trojan (RAT) Installation or Ransomware Deployment.


    Read More
  • Attachment: QR code with recipient targeting and special characters

    calendar Feb 9, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages with QR code in attachments containing special characters in the path that include the recipient's email address in either the URL path or fragment, potentially encoded in base64. The URLs have a simple path structure and may end with suspicious patterns.


    Read More
  • Anthropic Magic String in HTML

    calendar Feb 9, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing the specific test string 'ANTHROPIC_MAGIC_STRING' in the plain text body content.


    Read More
  • Brand impersonation: Navan

    calendar Feb 9, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of the expense management provider Navan.


    Read More
  • Attachment: cmd file extension

    calendar Feb 9, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing CMD (Command Prompt) batch files, either as direct attachments or within compressed archives. CMD files can execute arbitrary system commands and are commonly used to deliver malware or perform unauthorized system modifications.


    Read More
  • Reconnaissance: Empty subject with mismatched reply-to from new sender

    calendar Feb 6, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Message with no subject line from a new sender where the reply-to address differs from the sender address, potentially indicating header manipulation or impersonation tactics.


    Read More
  • Link: Suspicious go.php redirect with document lure

    calendar Feb 6, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links containing a PHP redirect endpoint with authentication parameters, commonly used in malicious redirects and unauthorized access attempts.


    Read More
  • Link: URL shortener with copy-paste instructions and credential theft language

    calendar Feb 6, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing only URL shorteners with copy-paste instructions and high-confidence credential theft language, typically used to evade URL analysis by requiring manual URL entry.


    Read More
  • Brand Impersonation: Disney

    calendar Feb 6, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages from senders impersonating Disney through display name spoofing or brand logo usage, combined with security-themed content and suspicious authentication patterns.


    Read More
  • New link domain (<=10d) from untrusted sender

    calendar Feb 6, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects links in the body of an email where the linked domain is less than 10 days old from untrusted senders.


    Read More
  • Link: SharePoint filename matches org name

    calendar Feb 6, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages claiming to share files via SharePoint or OneDrive where the shared file name pattern matches the organizational naming pattern, indicating potential abuse of legitimate file sharing services to impersonate organizations.


    Read More
  • Brand impersonation: Microsoft Teams invitation

    calendar Feb 6, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating a Microsoft Teams invites by matching known invite text patterns while containing join links that do not resolve to Microsoft domains. Additional verification includes checking for absent phone dial-in options and missing standard Teams help text or HTML meeting components.


    Read More
  • Service abuse: Apple TestFlight with suspicious developer reference

    calendar Feb 6, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects legitimate Apple TestFlight emails that reference potentially suspicious developers or apps, including variations of OpenAI, ChatGPT, or Meta in the app description or developer name fields.


    Read More
  • Canva infrastructure abuse

    calendar Feb 6, 2026  ·
    Share on: twitter facebook linkedin copy

    A fraudulent invoice/receipt found in the body of the message sent by exploiting Canva's design sharing feature.


    Read More
  • Brand impersonation: Microsoft Planner with suspicious link

    calendar Feb 6, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of Microsoft Planner, a component of the Microsoft 365 software suite.


    Read More
  • Brand impersonation: Fake Fax

    calendar Feb 5, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing fax-related language and notification elements from senders outside of known legitimate fax service providers.


    Read More
  • Credential phishing: Generic document sharing

    calendar Feb 5, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects credential phishing attempts using generic document sharing language where the sender claims to have sent a document for review, but the link doesn't point to legitimate file sharing services.


    Read More
  • Brand impersonation: DocuSign

    calendar Feb 5, 2026  ·
    Share on: twitter facebook linkedin copy

    Attack impersonating a DocuSign request for signature.


    Read More
  • Reconnaissance: All recipients cc/bcc'd or undisclosed

    calendar Feb 5, 2026 · Attack surface reduction Deliverability testing  ·
    Share on: twitter facebook linkedin copy

    Recon messages, a form of deliverability testing, are used to validate whether a recipient address is valid or not, potentially preceding an attack.

    All recipients are bcc'd or undisclosed, with no links or attachments, and a short body and subject from an unknown sender.


    Read More
  • Brand impersonation: Zoom via lookalike domain

    calendar Feb 5, 2026  ·
    Share on: twitter facebook linkedin copy

    Message contains a single link which attempts to spoof a 'zoom' link, sent from a free email provider to a single recipient.


    Read More
  • ClickFunnels link infrastructure abuse

    calendar Feb 5, 2026  ·
    Share on: twitter facebook linkedin copy

    Email contains a ClickFunnels (mass mailing platform) tracking link but does not originate from ClickFunnels sending infrastructure. The myclickfunnels.com domain has been abused by threat actors to attempt credential phishing.


    Read More
  • Brand impersonation: Meta and subsidiaries

    calendar Feb 5, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of Meta or Meta's subsidiaries Facebook and Instagram.


    Read More
  • Attachment: Legal themed message or PDF with suspicious indicators

    calendar Feb 5, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages with short body content or emoji containing PDF attachments from suspicious creators that include legal and compliance language with embedded malicious links, URL shorteners, or newly registered domains.


    Read More
  • macOS malware: Compiled AppleScript with document double-extension

    calendar Feb 5, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects compiled AppleScript files (.scpt) with document double-extensions (e.g., .docx.scpt, .pdf.scpt) commonly used in DPRK-attributed macOS malware campaigns. These files open in Script Editor when double-clicked and use social engineering (fake compatibility errors) to trick users into executing malicious reconnaissance scripts that fetch subsequent payload stages.


    Read More
  • Attachment: PDF contains W9 or invoice YARA signatures

    calendar Feb 4, 2026  ·
    Share on: twitter facebook linkedin copy

    PDF attachment contains YARA signatures commonly associated with fraudulent W9 tax forms or invoice documents, which are frequently used in social engineering attacks to steal sensitive information or facilitate business email compromise.


    Read More
  • Brand impersonation: Netflix

    calendar Feb 3, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of Netflix.


    Read More
  • Link: Common hidden directory observed

    calendar Feb 3, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Links in the message point to sensitive system directories like .git, .env, or .well-known that could expose confidential configuration data or system files. Actors will often abuse these directories to hide credential phishing landing pages of compromised sites.


    Read More
  • Brand impersonation: Microsoft

    calendar Feb 3, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of the Microsoft brand.


    Read More
  • Suspicious display name: Gmail sender with engaging languages

    calendar Feb 3, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects Gmail senders using display names with suspicious language patterns commonly associated with social engineering tactics, including urgency indicators, contact requests, and verification prompts.


    Read More
  • Service abuse: Trello board invitation with VIP impersonation

    calendar Feb 3, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects fraudulent Trello board invitations that impersonate organization VIPs by using organization domain names in board titles and including notes purportedly from legitimate company executives.


    Read More
  • Brand impersonation: Marriott with gift language

    calendar Feb 2, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating Marriott brand that contain gift-related language such as 'appreciation gift', 'thank you gift', or 'something special' from senders not associated with legitimate Marriott domains.


    Read More
  • Service abuse: WeTransfer callback scam

    calendar Jan 30, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects callback scams originating from legitimate WeTransfer noreply address using natural language processing to identify high-confidence callback scam intent in the message body.


    Read More
  • Impersonation: Executive using numbered local part

    calendar Jan 30, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages from free email providers where the sender's email address uses a pattern commonly associated with executive impersonation, containing 'chair' or 'ceo' followed by numbers in the local part.


    Read More
  • Link: 9WOLF phishkit initial landing URI

    calendar Jan 30, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links containing the '?ai=xd' query parameter associated with 9wolf phishing service initial landing pages.


    Read More
  • Link: Suspicious URL with recipient targeting and special characters

    calendar Jan 30, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing links with special characters in the path that include the recipient's email address in either the URL path or fragment, potentially encoded in base64. The URLs have a simple path structure and may end with suspicious patterns.


    Read More
  • Attachment: QR code with encoded recipient targeting and redirect indicators

    calendar Jan 30, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects QR codes in attachments that contain the recipient's email address (either plaintext or base64 encoded) and redirect through suspicious URI structures commonly associated with Kratos/SneakyLog redirection services.


    Read More
  • VIP impersonation with w2 request

    calendar Jan 29, 2026  ·
    Share on: twitter facebook linkedin copy

    This rule detects emails attempting to impersonate a VIP requesting a W-2


    Read More
  • Link: URL fragment with hexadecimal pattern obfuscation

    calendar Jan 29, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links containing URL fragments with repeating hexadecimal patterns, commonly used to obfuscate malicious destinations or bypass security filters.


    Read More
  • Attachment: ICS with embedded Javascript in SVG file

    calendar Jan 29, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects incoming messages containing ICS attachments with embedded SVG files that contain malicious JavaScript code, including base64-encoded content and potentially harmful event handlers. The rule specifically watches for onload events, location redirects, error handlers, and iframe elements with base64 data URIs.


    Read More
  • Link: HTML file with suspicious binary fragment ending pattern

    calendar Jan 29, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links to HTML files containing fragments with a suspicious pattern of alphanumeric characters followed by a 5-digit binary sequence, commonly used in malicious URL structures.


    Read More
  • Link: Base64 encoded recipient address in URL fragment with hex subdomain

    calendar Jan 29, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links containing a 40-character hexadecimal subdomain with the recipient's email address base64 encoded in the URL fragment, a technique used to personalize malicious links and evade detection.


    Read More
  • Attachment: Excel file with document sharing lure created by Go Excelize

    calendar Jan 29, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects Excel macro files created with the Go Excelize library containing document sharing language such as 'sent document', 'shared file', or 'REVIEW DOCUMENT'. These files are often used as lures to trick users into enabling macros or downloading malicious content.


    Read More
  • Attachment: Office file with document sharing and browser instruction lures

    calendar Jan 29, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects macro-enabled attachments containing document sharing language (sent, shared, forwarded) combined with browser interaction instructions (copy, right-click) or common email disclaimers. These tactics are often used to trick users into enabling macros or following malicious instructions.


    Read More
  • Brand impersonation: Office 365 mail service

    calendar Jan 29, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages from domains containing both 'o365' and 'mail' in the second-level domain, commonly used to impersonate legitimate Microsoft Office 365 mail services.


    Read More
  • Link: Mamba 2FA phishing kit

    calendar Jan 28, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links containing base64-encoded parameters characteristic of the Mamba 2FA phishing kit, specifically looking for 'sv=o365' and '&uid=USER' patterns in redirect history.


    Read More
  • Impersonation: Internal corporate services

    calendar Jan 28, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects phishing attempts that impersonate corporate services such as HR, helpdesk, and benefits, using specific language in the subject or sender's name and containing suspicious links from low-reputation or mass-mailing domains.


    Read More
  • Brand impersonation: Aramco

    calendar Jan 28, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of the petroleum and natural gas company Saudi Aramco.


    Read More
  • Attachment: Employment contract update with suspicious file naming

    calendar Jan 28, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing two attachments where one is a PowerPoint file with suspicious character substitution in the filename ('Empl0yment' using zero instead of 'o') and body text claiming an employment contract has been updated.


    Read More
  • Attachment: MS Office or RTF file with Shell.Explorer.1 com object with embedded LNK

    calendar Jan 28, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects embedded Shell.Explorer.1 COM objects containing LNK files within various file types.


    Read More
  • Reconnaissance: Hotel booking reply-to redirect

    calendar Jan 27, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating hotel booking inquiries by identifying common hotel-related language patterns from senders where the reply-to is a free email provider and differs from the sender domain in an effort to validate whether a recipient address is valid or not, potentially preceding an attack.


    Read More
  • Reconnaissance: Short generic greeting message

    calendar Jan 27, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects potential reconnaissance messages with very short, generic content like 'Hi' or 'Hello' from external senders. These messages are often used to validate email addresses and test deliverability before launching larger attacks.


    Read More
  • Link: Recipient email address in 'eta' parameter

    calendar Jan 27, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links containing the recipient's email address in the 'eta' query parameter, a technique commonly used to personalize malicious links and track targets.


    Read More
  • Link: Microsoft Dynamics 365 form phishing

    calendar Jan 27, 2026  ·
    Share on: twitter facebook linkedin copy

    Email body is suspicious, and links to a Microsoft Dynamics form. Known phishing tactic.


    Read More
  • Service abuse: Monday.com callback scam

    calendar Jan 26, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects callback scam solicitations originating from Monday.com's notification system using natural language understanding to identify fraudulent callback language in the message body.


    Read More
  • Attachment: Fake lawyer & sports agent identities

    calendar Jan 26, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing attachments or content that reference known fake identities used in FC Barcelona scams, including fake lawyer Michael Gerardus Hermanus Demon and sports agents with the surname Giuffrida. The rule examines EXIF metadata, OCR text from attachments, and message body content for these specific identity markers.


    Read More
  • Attachment: ICS file with meeting prefix

    calendar Jan 26, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects incoming messages with a single ICS calendar file attachment that has a filename starting with 'meeting_'.


    Read More
  • Headers: Fake in-reply-to with wildcard sender and missing thread context

    calendar Jan 23, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages claiming to be replies with In-Reply-To headers but lacking previous thread context, sent from addresses containing multiple wildcard characters in the local part.


    Read More
  • PhaaS: Impact Solutions (Impact Vector Suite)

    calendar Jan 23, 2026  ·
    Share on: twitter facebook linkedin copy

    Identifies the use of the Impact Solutions PhaaS.

    Impact Vector Suite is a full-spectrum payload delivery platform, engineered for stealth-optimized execution across all major deployment vectors.


    Read More
  • Link: Personal SharePoint with invalid recipients and credential theft language

    calendar Jan 23, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages with undisclosed or invalid recipients containing a single link to a personal SharePoint domain (with '-my' pattern) and high-confidence credential theft language in short message body.


    Read More
  • Brand impersonation: File sharing notification with template artifacts

    calendar Jan 23, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating file sharing services that contain template artifacts such as placeholder comments, incomplete HTML elements, and development remnants. The message includes 'shared with you' language and exhibits multiple indicators of being generated from a malicious template including HTML comments with development terms, broken anchor tags, and filename elements that closely match the subject line.


    Read More
  • Link: Tycoon2FA phishing kit (non-exhaustive)

    calendar Jan 23, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links utilizing the Tycoon2FA phishing kit, identified by specific DOM structure patterns and CDN characteristics, combined with suspicious domain indicators such as free subdomain hosts or suspicious TLDs. As the Tycoon2FA kit is evolving, this rule will not detect all variants of Tycoon2FA phishing, and is designed to compliment existing and future detections.


    Read More
  • Service abuse: Adobe legitimate domain with document approval language

    calendar Jan 23, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects messages from Adobe's legitimate email domain containing suspicious language about document or payment approval that may indicate service abuse.


    Read More
  • Extortion / sextortion (untrusted sender)

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects extortion and sextortion attempts by analyzing the email body text from an untrusted sender.


    Read More
  • BEC/Fraud: Romance scam

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    This rule detects messages attempting to initiate a Romance scam. The rule leverage tells such as undisclosed recipients, freemail emails in the body and common scam phrasing. Romance scams are deceptive schemes where scammers establish false romantic intentions towards individuals to gain their trust and eventually exploit them financially.


    Read More
  • Fake voicemail notification (untrusted sender)

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    This rule detects a common credential phishing vector enticing the user to engage with links under the premise that they have a voicemail to retrieve. The rule looks for voicemail verbiage in the display name, body, subject or a combination of those elements with emojis or a medium to high credential theft NLU Intent from first-time + unsolicited sender.


    Read More
  • Service abuse: Microsoft Power BI callback scam

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects callback scam content sent from the legitimate Microsoft Power BI service email address, indicating potential service abuse to distribute fraudulent callback solicitations.


    Read More
  • Callback phishing in body or attachment (untrusted sender)

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects callback scams by analyzing text within images of receipts or invoices from untrusted senders.


    Read More
  • Callback phishing via calendar invite

    calendar Jan 22, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects calendar invites containing callback phishing language in the DESCRIPTION of the invite.


    Read More
  • Brand impersonation: AuthentiSign

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating AuthentiSign through display name, domain, subject, or body content that either originate from non-AuthentiSign or spoofed domains.


    Read More
  • Attachment: PDF with recipient email in link

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects PDF attachments that contain the recipient's domain in the filename and include a single link personalized with the recipient's email address, either in the URL directly, encoded in base64, or within a QR code.


    Read More
  • Attachment: Password-protected PDF with fake document indicators

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects PDF attachments that are password protected and matching YARA signatures looking for specific content observed in previous activity.


    Read More
  • Brand impersonation: Blockchain[.]com

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of Blockchain[.]com, usually for credential theft.


    Read More
  • Attachment: Invoice and W-9 PDFs with suspicious creators

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing two PDF attachments where one has invoice-related naming patterns and another contains W-9 tax form indicators, with at least one PDF generated by Chrome or wkhtmltopdf tools, commonly used in business email compromise attacks targeting financial processes.


    Read More
  • Link: Display text with excessive right-to-left mark characters

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects links where the display text contains a high concentration of Unicode right-to-left mark characters (U+200F), which may be used to obfuscate or manipulate the visual representation of the link text to deceive recipients.


    Read More
  • Link: Self-sent message with quarterly document review request

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages sent from a user to themselves containing a link with quarterly indicators (q1_, q2_, q3_, q4_) and specific document review language requesting urgent feedback.


    Read More
  • Job scam with specific salary pattern

    calendar Jan 21, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects job scam content that includes specific weekly salary mentions (e.g., '$XXX weekly' patterns) in either the current email thread or previous thread conversations, while excluding legitimate income verification services.


    Read More
  • Link: Excessive URL rewrite encoders

    calendar Jan 21, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects URLs with many (excessive) encoding patterns, including multiple instances of the same encoder or four or more distinct encoders. These techniques are commonly used to obfuscate malicious URLs and evade security filters.


    Read More
  • Brand impersonation: USPS

    calendar Jan 20, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of the United States Postal Service.


    Read More
  • Link: Breely link masquerading as PDF

    calendar Jan 16, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages containing a single Breely link that displays as a PDF file. Typically, redirects to a different destination for malicious purposes.


    Read More
  • Brand impersonation: Xodo Sign

    calendar Jan 16, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages impersonating Xodo Sign with 'Processed by Xodo Sign' text from unauthorized senders that fail DMARC authentication.


    Read More
  • Service abuse: GetAccept callback scam content

    calendar Jan 16, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects callback scam language in messages sent through legitimate GetAccept infrastructure, indicating potential abuse of the service for fraudulent solicitation.


    Read More
  • BEC: Employee impersonation with subject manipulation

    calendar Jan 16, 2026  ·
    Share on: twitter facebook linkedin copy

    Subject matches the display name of someone in your organization, and the body resembles a BEC attack.


    Read More
  • Request for Quote or Purchase (RFQ|RFP) with suspicious sender or recipient pattern

    calendar Jan 15, 2026  ·
    Share on: twitter facebook linkedin copy

    RFQ/RFP scams involve fraudulent emails posing as legitimate requests for quotations or purchases, often sent by scammers impersonating reputable organizations. These scams aim to deceive recipients into providing sensitive information or conducting unauthorized transactions, often leading to financial loss, or data leakage.


    Read More
  • Brand impersonation: Quickbooks

    calendar Jan 15, 2026  ·
    Share on: twitter facebook linkedin copy

    Impersonation of the Quickbooks service from Intuit.


    Read More
  • Spam: Commonly observed formatting of unauthorized free giveaways

    calendar Jan 14, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects commonly observed formatting of unauthorized giveaways, free tools, and products by multiple different brands.


    Read More
  • Subject: Suspicious bracketed reference

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects messages with subject lines containing bracketed patterns that follow a specific format with repeated characters, numeric sequences, and structured tracking identifiers commonly used in malicious automated messaging systems.


    Read More
  • Brand impersonation: SendGrid

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects inbound messages that impersonate Twilio/SendGrid through display name or domain manipulation, combined with security or authentication-themed content, while failing authentication checks and originating from untrusted sources.


    Read More
  • Vendor impersonation: Thread hijacking with typosquat domain

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects potential thread hijacking where the sender uses a domain similar to known senders, exhibits BEC behavior, and shows signs of compromised thread continuity through domain spoofing or thread manipulation.


    Read More
  • Attachment soliciting user to enable macros

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively scans files and archives to detect documents that ask the user to enable macros, including if that text appears within an embedded image.


    Read More
  • Attachment with auto-executing macro (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attachment from an unsolicited sender contains a macro that will auto-execute when the file is opened.

    Macros are a common phishing technique used to deploy malware.


    Read More
  • Attachment with auto-opening VBA macro (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively scans files and archives to detect embedded VBA files with an auto open exec.


    Read More
  • Attachment with high risk VBA macro (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Potentially malicious attachment containing a VBA macro. Oletools categorizes the macro risk as 'high'.


    Read More
  • Attachment with macro calling executable

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively scans files and archives to detect embedded VBA files with an encoded hex string referencing an exe.

    This may be an attempt to heavily obfuscate an execution through Microsoft document.


    Read More
  • Attachment with VBA macros from employee impersonation (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attachment contains a VBA macro from a sender your organization has never sent an email to.

    Sender is using a display name that matches the display name of someone in your organization.

    VBA macros are a common phishing technique used to deploy malware.


    Read More
  • Attachment: .csproj with suspicious commands

    calendar Jan 12, 2026 · Suspicious attachment  ·
    Share on: twitter facebook linkedin copy

    Attached .csproj file contains suspicious commands.


    Read More
  • Attachment: 7z Archive Containing RAR File

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects 7z archive attachments that contain RAR files, which may be used to evade detection by nesting compressed file formats.


    Read More
  • Attachment: Any HTML file within archive (unsolicited)

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Recursively scans archives to detect HTML files from unsolicited senders.

    HTML files can be used for HTML smuggling and embedded in archives to evade detection.


    Read More
  • Attachment: Archive containing disallowed file type

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Recursively scans archives to detect disallowed file types. File extensions can be detected within password-protected archives.

    Attackers often embed malicious files within archives to bypass email gateway controls.


    Read More
  • Attachment: Archive with pdf, txt and wsf files

    calendar Jan 12, 2026 · Malfam: QakBot  ·
    Share on: twitter facebook linkedin copy

    Detects a known Qakbot delivery method, zip file with pdf, txt and wsf file at a depth of 1


    Read More
  • Attachment: Calendar file with invisible Unicode characters

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects calendar (.ics) attachments containing suspicious invisible Unicode characters, which may be used to hide malicious content or bypass security filters. The rule triggers on messages with calendar-related keywords in the subject or body.


    Read More
  • Attachment: Callback phishing solicitation via image file

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    A fraudulent invoice/receipt found in an image attachment. Callback Phishing is an attempt by an attacker to solicit the victim (recipient) to call a phone number. The resulting interaction could lead to a multitude of attacks ranging from Financial theft, Remote Access Trojan (RAT) Installation or Ransomware Deployment.


    Read More
  • Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability

    calendar Jan 12, 2026 · CVE-2021-40444  ·
    Share on: twitter facebook linkedin copy

    Attachment contains an external relationship that attempts to load a remote OLE object, consistent with use in CVE-2021-40444.

    On September 7, 2021, Microsoft released details about a zero day RCE vulnerability in MSHTML that affects Microsoft Windows.

    According to Microsoft: "we are aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents. An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine."


    Read More
  • Attachment: CVE-2023-21716 - Microsoft Office Remote Code Execution Vulnerability

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attachment contains an RTF file with a font table defining an excessive number of fonts, used to exploit CVE-2023-21716.


    Read More
  • Attachment: DocuSign impersonation via PDF linking to new domain

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    This rule detects PDF files containing a DocuSign logo linking to a newly created domain (Less than or equal to 3 days)


    Read More
  • Attachment: Embedded Javascript in SVG file

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Javascript inside SVG files can be used to smuggle malicious payloads or execute scripts.


    Read More
  • Attachment: Embedded VBScript in MHT file (unsolicited)

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    MHT files can be used to run VBScript, which can run malicious code.


    Read More
  • Attachment: EML containing a base64 encoded script

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attached EML contains a base64 encoded script in the message body.


    Read More
  • Attachment: EML file contains HTML attachment with login portal indicators

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attached EML file contains an HTML attachment with suspicious login indicators. Known credential theft technique.


    Read More
  • Attachment: EML with Encrypted ZIP

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Detects when an EML file is attached that contains an encrypted ZIP file. The encryption can be used to bypass security scanning and deliver malicious content.


    Read More
  • Attachment: EML with suspicious indicators

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attached EML contains suspicious indicators, such as a missing sender email or short HTML body.


    Read More
  • Attachment: Encrypted Microsoft Office file (unsolicited)

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Encrypted OLE2 (eg Microsoft Office) attachment from an unsolicited sender. Attachment encryption is a common technique used to bypass malware scanning products. Use if receiving encrypted attachments is not normal behavior in your environment.


    Read More
  • Attachment: Excel file with suspicious template identifier

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Detects Excel attachments containing a specific template identifier (TM16390866) in the EXIF metadata, which may indicate malicious or suspicious document templates being used to distribute harmful content.


    Read More
  • Attachment: Fake secure message and suspicious indicators

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Body contains language resembling credential theft, and an attached "secure message" from an untrusted sender.


    Read More
  • Attachment: File execution via Javascript

    calendar Jan 12, 2026 · Attack surface reduction  ·
    Share on: twitter facebook linkedin copy

    Javascript contains identifiers or strings that may attempt to execute files.


    Read More
  • Attachment: Filename containing Unicode right-to-left override character

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively identifies attachments that attempt to conceal their true file extension by using right-to-left override characters


    Read More
  • Attachment: HTML attachment with login portal indicators

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Recursively scans files and archives to detect indicators of login portals implemented in HTML files. This is a known credential theft technique used by threat actors.


    Read More
  • Attachment: HTML file contains exclusively Javascript

    calendar Jan 12, 2026  ·
    Share on: twitter facebook linkedin copy

    Attached HTML file does not contain any HTML other than a