sublime-rules icon indicating copy to clipboard operation
sublime-rules copied to clipboard

Sublime rules for email attack detection, prevention, and threat hunting.

Results 226 sublime-rules issues
Sort by recently updated
recently updated
newest added

# Description Create new coverage for base64 encoded zips within HTML files that contain javascript logic to decode the base64 encoded zip file. This rule makes use of the offset...

in-test-rules

# Description adding additional logic to account for impersonation samples with sus calendar invites # Associated samples - https://platform.sublime.security/messages/4facb1b32712710d6216d0bdd455f09bbbc54066f759d13b74e1475d2ec20633

in-test-rules

# Description Detects messages impersonating Charter Spectrum by using variations of 'Spectrum' or 'MyCharter' in the display name while not originating from legitimate Charter domains or failing DMARC authentication. #...

in-test-rules

# Description Detects messages sent via Microsoft CDO for Windows 2000 or PHPMailer that contain HTML paragraph elements with transparent text or hidden content styling, commonly used to evade content...

in-test-rules

Updated regex patterns to improve detection of fake fax messages. # Description updated regex keyword to account for samples beginning with `fr` (possible shorthand for fax received) # Associated samples...

in-test-rules

# Description convert some rules to use subject.base, subject.is_reply and subject.is_forward instead of subject.subject and various methods of determine if the subject indicates a reply/forward This allows for a more...

in-test-rules
review-needed

# Description This rule will detect a docx that is appending the recipient's email address to the end of a hyperlink using an anchor tag. # Associated samples - [Sample...

in-test-rules

# Description Detects pdf attachments that are impersonating Microsoft purview. # Associated samples - [Sample 1](https://platform.sublime.security/messages/4fabc2e75bf23581159b34314d962685bd45936da41d36496c1e0f3a93c0eba7?preview_id=019a501d-bfc2-73c9-b55d-b0a8218f9cc9) - [Sample 2](https://platform.sublime.security/messages/4fab19ea6fa413240be77ec4680b3a96d5585748f3094362644783e723dee974) ## Associated hunts - [Hunt 1](https://platform.sublime.security/hunts/019a5099-0a10-7bd8-9bf7-a7a1d9964b62)

in-test-rules

Added new key phrase for detection # Description Adding new key phrases, OCR updates & topic negations. # Associated samples [- Sample 1](https://platform.sublime.security/messages/4f922f97163b2f926f452d265d9ab54553e251cd406a5871c01ba2c5a7c209ce?preview_id=0199cb4a-d412-7935-8ac4-93f260696323) ## Associated hunts [- Hunt 1](https://platform.sublime.security/messages/hunt?huntId=019a50ec-cfce-7c70-84a0-b247bd2cfad5) [-...

in-test-rules

# Description Modifying negation condition to cover “hijacked events & webinars current threads”, while requiring +700 characters & specific phrase of “This Voicemail was shared”. Absorbing small change from prior...

in-test-rules