• Sublime Core Feed
High Severity

Link: Recipient domain in URL path

Description

This rule detects URL paths which contain the recipient SLD multiple times. This has been observed in multiple credential phishing campaigns with MFA enrollment themed lures.

References

No references.

Sublime Security
Created Jul 3rd, 2024 • Last updated Aug 5th, 2025
Source
type.inbound
// 
and not profile.by_sender().solicited
// not high trust sender domains
and (
  (
    sender.email.domain.root_domain in $high_trust_sender_root_domains
    and not headers.auth_summary.dmarc.pass
  )
  or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
and
// any of the body links, contain the recipient domain repeating multiple times in a link path
any(
    // make a list of distinct email slds
    distinct(map(recipients.to, .email.domain.sld)), 
    // take the list of slds and cat it into a string of /sld/sld/ and search for it in links
    any(body.links, strings.icontains(.href_url.path, strings.concat("/", .., "/", .., "/")))
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started