• Sublime Core Feed

Description

Detects messages impersonating AuthentiSign through display name, domain, subject, or body content that either originate from non-AuthentiSign or spoofed domains.

References

No references.

Sublime Security
Created Jan 21st, 2026 • Last updated Jan 21st, 2026
Source
type.inbound
and strings.icontains(body.current_thread.text, "authentisign")
and (
  regex.icontains(body.current_thread.text, 'signing (?:name|party)')
  or strings.ilike(sender.display_name, '*authentisign*')
  or strings.ilevenshtein(sender.display_name, 'authentisign') <= 1
  or strings.ilike(sender.email.domain.domain, '*authentisign*')
)
and (
  sender.email.domain.root_domain != "authentisign.com"
  or (
    sender.email.domain.root_domain == "authentisign.com"
    and not (headers.auth_summary.spf.pass or headers.auth_summary.dmarc.pass)
  )
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started