• Sublime Core Feed

Description

Detects suspicious content in Zoom Events notifications that contain credential theft language and links to file hosting sites.

Sublime Security
Created Jun 23rd, 2025 • Last updated Sep 22nd, 2025
Source
type.inbound
and sender.email.email == "noreply-zoomevents@zoom.us"
and (
  headers.auth_summary.spf.pass
  or headers.auth_summary.dmarc.pass
)

// extract the actor controlled message from the email body
and any(html.xpath(body.html,
                   "//div[@class='eb-content css-1l7xmti']//td[@data-dynamic-style-background-color='email.bodyColor.color' and @style='border-radius: 8px; background-color: rgb(255, 255, 255);']"
        ).nodes,
        // look at the content before the copyright footer in the template and pass it to NLU to see if it's cred theft 
        any(html.xpath(.,
                       "//td[@data-dynamic-style-background-color='email.bodyColor.color']/*[position() < last()]"
            ).nodes,
            any(ml.nlu_classifier(..display_text).intents,
                .name == "cred_theft" and .confidence != "low"
            )
        )
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started