On this page:
Threat Detection
June 18, 2025
Taking a look at some great Detection Rules written by Sublime Community members
Sublime was created to do email security differently. Instead of walling off proprietary Detections like traditional solutions, we kept our Rules open and gave customers the tools to easily modify and create new, AI-powered Detection Rules whenever they wanted. No tickets necessary – just edit, test, iterate, and backtest Rules from an intuitive detection workbench.
If a Rule could benefit the larger Sublime community, it can be shared directly from the Rule Editor. If shared with us, the Rule goes directly to our Detection team for review. At that point, they will determine if the Rule should be added to our Core Feed, make revisions, perform testing, and then add it to the Feed.
If a rule is too niche to be considered for the Core Feed, it can still be shared on the Sublime Community Slack for other community members to review for themselves.
Community is important in security. The amount of attackers will always outnumber the amount of security practitioners on any given team. But as a community, we can work together to increase our security depth and reach. With that in mind, we’d like to shine a spotlight on a few of our community-contributed Detection Rules and thank the authors for making our community stronger.
Author: @vector_sec
Attackers will often hide payloads within files commonly used by organizations. One method we’ve seen is to embed a malicious Visual Studio Tools for Office (VSTO) add-in within a Microsoft Office document. This rule starts by using lists to determine if an attachment could contain a macro or is an archive. It then uses .scan.exiftool
to look at attachment metadata to determine if it contains a VSTO add-on created outside of trusted organization domains. Finally, it verifies that the email was both unsolicited (no previous outreach) and not previously flagged as a false positive.
Author: @ajpc500
This Detection Rule was originally created to detect QakBot attacks that leveraged double Base64 encoded ZIP files smuggled in HTML attachments. Similar to the previous rule, it first rules out any senders that are known or confirmed safe. It then looks for any attached HTML files. If any are attached, it uses the FileExplode function in order to search for specific strings. It then uses the ilike function to search for specific wildcard-wrapped strings that are the hallmark of double Base64-encoded ZIP files.
Rule: https://sublime.security/feeds/core/detection-rules/attachment-html-smuggling-with-rot13-6eacc4cf/
Author: @Kyle_Parrish_
Attackers will use obfuscation techniques to bypass email security filters. This Detection Rule analyzes attached HTML files to find ROT13-based obfuscation within JavaScript identifiers. While not complex, this Detection Rule highlights the ease with which a detection engineer can shut down novel attacks quickly with Message Query Language (MQL). As with the above rules, after this rule was created by the author, it was shared with Sublime for inclusion in our Core Feed.
Once more, we want to thank the Sublime Community for all of their contributions to our Core Feed. While the majority of our customers and users don't write their own rules, we’re always excited to see the interesting rules that get cooked up along the edges.
If you’d like to see the power of Sublime for yourself, get an expert demo today.
Sublime releases, detections, blogs, events, and more directly to your inbox.
The latest research, attack spotlights, and product updates.
Experience Sublime’s adaptable email security platform and take control of your email environment today.