• Sublime Core Feed
Medium Severity

Google Services Using G.co Shortlinks

Labels

Credential Phishing
Evasion
Free email provider
Content analysis
Header analysis
Sender analysis
URL analysis

Description

Identifies messages from authenticated Google domains containing g.co shortened URLs with a subdomain in either the message body links or thread text.

References

Sublime Security
Created Jan 29th, 2025 • Last updated Jan 29th, 2025
Feed Source
Sublime Core Feed
Source
GitHub
type.inbound
// allow for multiple google TLDs
and sender.email.domain.sld == "google"
and headers.auth_summary.spf.pass
// g.co url shortner in links or the current thread to identify the workspace name
and (
  any(body.links, .href_url.domain.root_domain == 'g.co' and .href_url.domain.subdomain is not null)
  or (
    strings.icontains(body.current_thread.text, '.g.co')
    and regex.icontains(body.current_thread.text, '[^\s]+\.g\.co\b')
  )
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Get Started