• Sublime Core Feed

Description

Credential Phishing attacks have been observed using excessive line breaks to obfuscate javascript functions within html files.

References

No references.

Sublime Security
Created Sep 8th, 2023 • Last updated Sep 8th, 2023
Source
type.inbound
and any(attachments,
        (
          .file_extension in~ ("html", "htm", "shtml", "dhtml")
          or .file_extension in~ $file_extensions_common_archives
          or .file_type == "html"
        )
        and any(file.explode(.),
                any(.scan.strings.strings,
                // return new line padded obfuscation 
                    regex.contains(., '(\\r\\n\S{2}){50,}')
                    and strings.contains(., 'decodeURIComponent')
                )
        )
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started