• Sublime Core Feed
Medium Severity

Open redirect: Linkedin

Labels

Credential Phishing
Malware/Ransomware
Open redirect
Sender analysis
URL analysis

Description

Detects emails containing links using Linkedin '/slink?code=xxxxx' open redirect where the email has not come from Linkedin.com

References

@xNymia
Created Aug 17th, 2023 • Last updated Apr 15th, 2025
Feed Source
Sublime Core Feed
Source
GitHub
type.inbound
and (
  (
    sender.email.domain.root_domain != "linkedin.com"
    and (
      (
        any(body.links,
            .href_url.domain.root_domain == 'linkedin.com'
            and .href_url.path == '/slink'
        )
        and any(body.links, strings.ilike(.href_url.query_params, 'code=*'))
      )
      or any(body.links,
             .href_url.domain.root_domain == 'linkedin.com'
             and strings.icontains(.href_url.query_params, 'redirect_uri')
      )
    )
  )
  or any(attachments,
         .file_type == "pdf"
         and any(file.explode(.),
                 (
                   any(.scan.url.urls,
                       .domain.root_domain == 'linkedin.com'
                       and .path == '/slink'
                   )
                   and any(.scan.url.urls,
                           strings.ilike(.query_params, 'code=*')
                   )
                 )
                 or any(.scan.url.urls,
                        .domain.root_domain == 'linkedin.com'
                        and strings.icontains(.query_params, 'redirect_uri')
                 )
         )
  )
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Get Started