• Sublime Core Feed

Sublime Core Feed

This repo contains open-source Rules for Sublime, a free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing.

Sublime Security
Last updated Mar 27th, 2026
Feed Source
Detection Method is
Rule Name & Severity
Author
Last Updated
Labels
Attachment: Calendar invite from recently registered domain
Sublime Security
6mo ago
Sep 25th, 2025
Attachment: DocuSign impersonation via PDF linking to new domain
Sublime Security
2mo ago
Jan 12th, 2026
Attachment: Legal themed message or PDF with suspicious indicators
Sublime Security
1mo ago
Feb 5th, 2026
Attachment: PDF with multistage landing - ClickUp abuse
Sublime Security
1mo ago
Feb 27th, 2026
BEC/Fraud: Urgent language and suspicious sending/infrastructure patterns
Sublime Security
2mo ago
Jan 12th, 2026
Brand impersonation: Microsoft fake sign-in alert
Sublime Security
2mo ago
Jan 12th, 2026
Brand impersonation: SharePoint PDF attachment with credential theft language
Sublime Security
4mo ago
Nov 7th, 2025
Brand impersonation: Silicon Valley Bank
Sublime Security
2mo ago
Jan 12th, 2026
Brand impersonation: Stripe notification
Sublime Security
6mo ago
Sep 26th, 2025
Callback phishing: Branded invoice from sender/reply-to domain less than 30 days old
Sublime Security
5mo ago
Oct 17th, 2025
Fraudulent order confirmation/shipping notification from Chinese sender domain
Sublime Security
2mo ago
Jan 12th, 2026
Generic service abuse from newly registered domain
Sublime Security
7mo ago
Aug 5th, 2025
Impersonation: Suspected supplier impersonation with suspicious content
Sublime Security
1y ago
Feb 3rd, 2025
Link: Abused Adobe Express
Sublime Security
8mo ago
Jul 23rd, 2025
Link: Commonly Abused Web Service redirecting to ZIP file
Sublime Security
20d ago
Mar 10th, 2026
Link: Cryptocurrency fraud with suspicious links
Sublime Security
3mo ago
Dec 1st, 2025
Link: Financial account issue with suspicious indicators
Sublime Security
6d ago
Mar 24th, 2026
Link: Google Firebase dynamic link that redirects to new domain (<7 days old)
@ajpc500
2mo ago
Jan 12th, 2026
Link: Multistage landing - Abused Adobe frame.io
Sublime Security
7mo ago
Aug 5th, 2025
Link: Multistage landing - Abused Docusign
Sublime Security
7mo ago
Aug 5th, 2025
Link: Multistage landing - Abused Google Drive
Sublime Security
7mo ago
Aug 5th, 2025
Link: Multistage landing - ClickUp abuse
Sublime Security
1mo ago
Feb 27th, 2026
Link: Multistage landing - Published Google Doc
Sublime Security
7mo ago
Aug 5th, 2025
Link: Romance/Sexual Language With Suspicious Link
Sublime Security
7mo ago
Aug 22nd, 2025
New link domain (<=10d) from untrusted sender
Sublime Security
1mo ago
Feb 6th, 2026
Newly registered sender or reply-to domain with newly registered linked domain
Sublime Security
7mo ago
Aug 5th, 2025
New sender domain (<=10d) from untrusted sender
Sublime Security
2y ago
Nov 20th, 2024
Recruitee Infrastructure Abuse
Sublime Security
8mo ago
Jul 16th, 2025
Service abuse: AppSheet infrastructure with suspicious indicators
Sublime Security
5mo ago
Oct 6th, 2025
Service abuse: Google Drive share from new reply-to domain
Sublime Security
4mo ago
Nov 13th, 2025
Service abuse: Google Firebase sender address with suspicious content
Sublime Security
18d ago
Mar 12th, 2026
Spam: Fake photo share
Sublime Security
4mo ago
Nov 8th, 2025
Spam/fraud: Predatory journal/research paper request
Sublime Security
4mo ago
Nov 3rd, 2025
Spam: New link domain (<=10d) and emojis
Sublime Security
8mo ago
Jul 16th, 2025
Suspected lookalike domain with suspicious language
Sublime Security
2mo ago
Jan 12th, 2026
Suspicious newly registered reply-to domain with engaging financial or urgent language
Sublime Security
2mo ago
Jan 12th, 2026
Vendor compromise: GovDelivery message with suspicious link
Sublime Security
7mo ago
Aug 5th, 2025
Vendor impersonation: Thread hijacking with typosquat domain
Sublime Security
2mo ago
Jan 12th, 2026
VIP impersonation: Fake thread with display name match, email mismatch
Sublime Security
2mo ago
Jan 12th, 2026