• Sublime Core Feed
Medium Severity

Link: Suspicious go.php redirect with document lure

Description

Detects links containing a PHP redirect endpoint with authentication parameters, commonly used in malicious redirects and unauthorized access attempts.

References

No references.

Sublime Security
Created Feb 6th, 2026 • Last updated Feb 6th, 2026
Source
type.inbound
and any(body.current_thread.links,
        strings.ends_with(.href_url.path, "go.php")
        and strings.starts_with(.href_url.query_params, "auth=")
        and strings.count(.href_url.path, "/") == 2
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started