Sublime news

Key findings from the Q1 2025 Sublime Email Threat Research Report

April 28, 2025

Key findings from the Q1 2025 Sublime Email Threat Research Report

Increased threat uniqueness, emerging attack vectors, evasion techniques by attack type, and more

Ready to see Sublime 
in action
Get a demo
Authors
Machine Learning Team
Machine Learning Team
Sublime
Threat Detection Team
Threat Detection Team
Sublime

In our first Sublime Email Threat Research Report, our Machine Learning and Detection teams analyzed anonymized customer telemetry under strict adherence to our internal Data Privacy Framework. The findings highlight significant growth in QR code phishing, OAuth phishing, and the need for a layered, adaptive detection strategy.

Download the Sublime Email Threat Research Report (Q1 2025)

Key takeaways

Email threats continue to evolve rapidly, with threat actors demonstrating increased sophistication in both novel attack vectors and evasion techniques. What we found:

  • QR code phishing increased 40-60% compared to Q4 2024, accounting for 2.5% of all phishing attempts. Along with this increase in attack volume, the variety of evasion techniques has also increased.
  • Living Off Trusted Sites (LOTS) attacks leveraging trusted cloud services now account for ~8% of attacks. These include enterprise services (Microsoft 365, Google Workspace, DocuSign), as well as consumer services (Venmo, PayPal).
  • Attacks using malicious SVG files as an attack vector have increased significantly. Our data shows a 47000% increase in SVG, attachment-based attacks in Q1 2025, accounting for 1% of all phishing attempts.
  • There’s been a significant increase in BEC/fraud campaigns with evidence of AI-created content. GenAI is helping bad actors create, automate, and refine targeted attack campaigns faster than ever.

Trends

Emerging trends make it clear organizations need a layered, adaptive detection strategy that blends AI, machine learning, behavioral analysis, and threat intelligence complemented with other defense-in-depth controls to effectively counter the full spectrum of email threats.

Threat uniqueness and customization

On average, 90% of malicious emails detected were customized (as defined in the report) to their target in some way, representing a 12% increase from our observations in Q1 2024. This is the clearest signal yet that mass, template-driven phishing is dying. Attackers are leveraging automation, AI, and reconnaissance to craft bespoke attacks that bypass static defenses. The old “block once, protect forever” model is collapsing.

Emerging attack vectors

Breakthrough threats like QR codes, SVGs, and LOTS attacks represent a significant evolution from traditional single-vector attacks, requiring security teams to implement strategies that can detect and respond to complex attack chains.

Continued evolution of BEC and social engineering

BEC and related social engineering attacks continue to represent the highest financial cybercrime risk to most organizations, with clear industry-specific targeting and patterns emerging.

Evasion techniques by attack type

Evasion techniques vary significantly by attack type, reflecting tailored strategies to bypass specific detection layers. Attackers are not just changing payloads, they’re changing how they hide their delivery. For example, 71% of callback phishing exploits attachment-based evasion, typically using PDFs or images to lure victims into phone-based social engineering.

Evasion stacking

The complexity of email-based attacks continues to increase as threat actors combine multiple evasion techniques in a single campaign. This "evasion stacking" significantly reduces traditional detection rates and it has been observed across all major attack types.

The path forward

As attackers continue to evolve their techniques at an accelerating pace, security practitioners must embrace adaptive, intelligence-driven approaches that can respond quickly to emerging threats and anticipate future developments.

Sublime is an adaptive email security platform built for the way attackers operate today. Rather than waiting on signature updates or model refreshes, Sublime continuously analyzes detection signals from your environment, generates new coverage in near real time, and automatically validates it against historical data – without waiting on manual retraining.

Want to dive deeper? Read the full Sublime Email Threat Research Report (Q1 2025) to explore the data and insights shaping the future of email security.

Heading

About the authors

Machine Learning Team
Machine Learning Team
Sublime

The Machine Learning team at Sublime is responsible for developing intelligent systems that detect, analyze, and defend against evolving email threats through adaptive AI technologies.

Threat Detection Team
Threat Detection Team
Sublime

The Threat Detection team at Sublime is responsible for monitoring environments to discover emerging email attacks and developing new Detection Rules for the Core Feed.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

January 6, 2026
HostPapa abuse treasure trove discovered in GoDaddy email threat hunt
Attack spotlight

HostPapa abuse treasure trove discovered in GoDaddy email threat hunt

Peter DjordjevicPerson
Peter Djordjevic
Detection
Person
December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern