Tactic or Technique: Evasion

Evasion techniques help attackers sneak past email security filters by hiding or disguising malicious content. These tactics are designed to fool both traditional scanners and newer AI-based systems by changing how the message is structured or displayed.
You might see phishing content buried under blocks of harmless-looking text, or important details shown as images so they can't be scanned. Some messages break up keywords using hidden HTML or use misspelled words and lookalike characters to trick you into missing the signs.
More advanced versions use JavaScript that reveals the payload only after the message has passed through security checks. Others try to confuse AI systems with prompt injection or strange formatting.
These techniques create gaps in protection and give attackers a better chance of reaching your inbox. Spotting them early is key. The more familiar you are with how these tricks work, the easier it is to catch them before they do damage.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Link: Non-standard port 8443 in display URL
4d ago
Mar 26th, 2026
Sublime Security
Attachment: ZIP file with CVE-2026-0866 exploit
10d ago
Mar 20th, 2026
Sublime Security
Link: Free file hosting with undisclosed recipients
11d ago
Mar 19th, 2026
Sublime Security
Service abuse: Substack credential theft with confusable characters and branded button redirects
11d ago
Mar 19th, 2026
Sublime Security
Service abuse: Domains By Proxy sender
12d ago
Mar 18th, 2026
Sublime Security
Link: PDF display text with fake copyright claim template
12d ago
Mar 18th, 2026
Sublime Security
EML attachment with credential theft language (unknown sender)
13d ago
Mar 17th, 2026
Sublime Security
Link: Suspicious SharePoint document name
13d ago
Mar 17th, 2026
Sublime Security
Link: IPv4-mapped IPv6 address obfuscation
13d ago
Mar 17th, 2026
Sublime Security
Attachment: PDF with a suspicious string and single URL
13d ago
Mar 17th, 2026
Sublime Security
Attachment: PDF proposal with credential theft indicators
13d ago
Mar 17th, 2026
Sublime Security
Attachment: Archive containing HTML file with file scheme link
13d ago
Mar 17th, 2026
Sublime Security
Body HTML: Comment with 24-character hex token
13d ago
Mar 17th, 2026
Sublime Security
Attachment: ICS file with excessive custom properties
13d ago
Mar 17th, 2026
Sublime Security
Attachment: ICS with employee policy review lure
14d ago
Mar 16th, 2026
Sublime Security
Link: Obfuscation via userinfo with suspicious indicators
17d ago
Mar 13th, 2026
Sublime Security
Sender: IP address in local part
18d ago
Mar 12th, 2026
Sublime Security
Link: Microsoft device code authentication with suspicious indicators
18d ago
Mar 12th, 2026
Sublime Security
Service abuse: Google OAuth with suspicious redirect destination
18d ago
Mar 12th, 2026
Sublime Security
BEC/Fraud: Reply-chain manipulation with urgent keywords and self-reply
19d ago
Mar 11th, 2026
Sublime Security