• Sublime Core Feed

Description

Detects Dropbox phishing emails with no Dropbox links with image attachments from an untrusted sender.

References

No references.

Sublime Security
Created Aug 17th, 2023 • Last updated Jul 16th, 2025
Source
type.inbound
and length(filter(attachments, .file_type not in $file_types_images)) == 0
and any(body.links,
        not strings.ilike(.href_url.domain.root_domain, "dropbox.*")
)
and any(attachments,
        .file_type in $file_types_images
        and any(file.explode(.),
                strings.ilike(.scan.ocr.raw, "*dropbox*")
                and strings.ilike(.scan.ocr.raw, "*review*", "*sign*")
        )
)
and (
  not profile.by_sender().solicited
  or profile.by_sender().any_messages_malicious_or_spam
)
and not profile.by_sender().any_messages_benign 
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started