October 2, 2025

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. These attacks can be prevented with a free Sublime account.
EMAIL PROVIDER: Google Workspace, Microsoft 365
ATTACK TYPE: Malware/Ransomware, Credential Phishing
Invitation-based attacks tend to peak around the holidays, but this year we are already seeing an influx of malicious digital invitations hitting inboxes. The two most frequently impersonated brands in these attacks (at the moment) are Evite and Punchbowl. In these attacks, the target is sent an invitation message with an RSVP link.
While these attacks all appear to use similar message templates, what drew our interest was how much variance we’ve seen across attacks. Payloads currently vary between credential phishing and malware distribution, but even within those attack types, we see payload variation. Let’s take a look at a few of these attacks and their differences.
The messages follow similar templates that involve both brand and invitation impersonation. The level of sophistication varies per attack, with some delivering very convincing impersonations. Here are two examples:


While attack quality varies, these two examples show a high level of impersonation. In both cases we see invitation verbiage and imagery, brand logos, footers that have been copied from real messages, and invitation-based CTAs. We can also see that both of these messages were sent to undisclosed recipient lists and BCCs – suspicious indicators in otherwise well-crafted messages.
Clicking any of the buttons in the messages launches the attack.
The Punchbowl message above is a Google-specific credential phishing attack. Clicking the Open invitation button first takes the target to a free, Cloudflare-hosted page (in this case, on pages[.]dev) which quickly redirects to a fake Cloudflare Turnstile page:

After the target confirms that they’re not a bot, they’re taken to the credential theft page:

Another credential phishing variant we observed involved a fake login page that accepted credentials for a variety of providers. In this example, the payload was hosted on storage.googleapis[.]com. In this variant, clicking on the button in the email takes the target to a fake multi-auth login page with Evite brand impersonation:

Clicking on any of those options takes the target to a fake login window that phishes credentials:

Regardless of the credentials entered, this page will initially return an “incorrect password” error:

If the target re-enters their credentials, they’re taken to a “confirmation” countdown. There is no credential validation by the page:

Followed by a verification code sent to their email:

Just like the password, this verification code is not validated. Entering any code and clicking Verify takes the target to a real invitation to a fake party:

In the instances where these attacks were used to deliver malware, we observed payload variation similar to the credential phishing attacks. In all observed cases, the payloads were remote monitoring and management (RMM) tools that had been maliciously repurposed.
The most frequent payloads were SimpleHelp/JWrapper, PDQ, or Atera Agent (observed in previous attacks). While malicious RMMs are not novel payloads, we found the amount of variety across similar attacks to be interesting.
In most cases, clicking the invitation link in the message would auto-download malware with no further instructions. The payload always had a invitation-based name to trick the target into running it. For example:
In some cases, a confirmation page launched with the download, directing the target to “view” the “invitation” in their Download folder:

The level of variation across these messages and payloads points to multiple attackers using the same lures, a single group of attackers varying and evolving their attack to test security perimeters, or both.
Sublime's AI-powered detection engine prevented these attacks. Some of the top signals for a credential phishing variant of this attack were:
Here is the Autonomous Security Analyst (ASA) verdict for that attack:

Sublime's AI-powered detection engine prevented these attacks. Some of the top signals for a malware variant of this attack were:
Here is the Autonomous Security Analyst (ASA) verdict for that attack:

Credential phishing and RMM attacks give bad actors a lot of ways to do bad things, so it’s important that attacks don’t make it into inboxes. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on seemingly minor discrepancies.
If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.
Read more Attack Spotlights:
Sublime releases, detections, blogs, events, and more directly to your inbox.
See how Sublime delivers autonomous protection by default, with control on demand.