• Sublime Core Feed

Description

Detects messages impersonating McAfee through display name, subject line, body content, or NLU entity detection when the sender is not from verified McAfee domains or other high-trust domains with valid DMARC authentication.

References

No references.

Sublime Security
Created Mar 11th, 2026 • Last updated Mar 11th, 2026
Source
type.inbound
and (
  regex.icontains(body.current_thread.text,
                  'McAfee.{0,30}(?:Defense|Protection)'
  )
  or regex.icontains(subject.base, 'McAfee.{0,30}(?:Defense|Protection)')
  or regex.icontains(sender.display_name, '^[\s[:punct:]]*mc\s*afee(?:$|[^,])')
  or (
    any(ml.nlu_classifier(body.current_thread.text).entities,
        .name in ("org", "sender") and strings.icontains(.text, 'mcafee')
    )
    and length(filter(ml.nlu_classifier(body.current_thread.text).entities,
                      .name == "urgency"
               )
    ) >= 2
  )
)
and not any(ml.nlu_classifier(body.current_thread.text).topics,
            .name in ("Newsletters and Digests", "Advertising and Promotions")
            and .confidence != "low"
)
and not (
  sender.email.domain.root_domain in ('mcafee.com', 'mcafeesecure.com')
  and headers.auth_summary.dmarc.pass
)
and not (
  sender.email.domain.root_domain in $high_trust_sender_root_domains
  and headers.auth_summary.dmarc.pass
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started