Tactic or Technique: Evasion

Evasion techniques help attackers sneak past email security filters by hiding or disguising malicious content. These tactics are designed to fool both traditional scanners and newer AI-based systems by changing how the message is structured or displayed.
You might see phishing content buried under blocks of harmless-looking text, or important details shown as images so they can't be scanned. Some messages break up keywords using hidden HTML or use misspelled words and lookalike characters to trick you into missing the signs.
More advanced versions use JavaScript that reveals the payload only after the message has passed through security checks. Others try to confuse AI systems with prompt injection or strange formatting.
These techniques create gaps in protection and give attackers a better chance of reaching your inbox. Spotting them early is key. The more familiar you are with how these tricks work, the easier it is to catch them before they do damage.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Brand impersonation: File sharing notification with template artifacts
16m ago
Jan 23rd, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-file-sharing-notification-with-template-artifacts-37d89611
Link: Tycoon2FA phishing kit (non-exhaustive)
12h ago
Jan 23rd, 2026
Sublime Security
/feeds/core/detection-rules/link-tycoon2fa-phishing-kit-non-exhaustive-a070d4e2
Link: Suspicious URL with recipient targeting and special characters
21h ago
Jan 22nd, 2026
Sublime Security
/feeds/core/detection-rules/link-suspicious-url-with-recipient-targeting-and-special-characters-e808be3a
Callback phishing via calendar invite
1d ago
Jan 22nd, 2026
Sublime Security
/feeds/core/detection-rules/callback-phishing-via-calendar-invite-95c84360
Attachment: Password-protected PDF with fake document indicators
2d ago
Jan 21st, 2026
Sublime Security
/feeds/core/detection-rules/attachment-password-protected-pdf-with-fake-document-indicators-b45e4440
Attachment: QR code with recipient targeting and special characters
2d ago
Jan 21st, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09
Link: Display text with excessive right-to-left mark characters
2d ago
Jan 21st, 2026
Sublime Security
/feeds/core/detection-rules/link-display-text-with-excessive-right-to-left-mark-characters-a45cfd4c
Link: Self-sent message with quarterly document review request
2d ago
Jan 21st, 2026
Sublime Security
/feeds/core/detection-rules/link-self-sent-message-with-quarterly-document-review-request-3c42cec6
Link: Excessive URL rewrite encoders
2d ago
Jan 21st, 2026
Sublime Security
/feeds/core/detection-rules/link-excessive-url-rewrite-encoders-b88e53a7
Request for Quote or Purchase (RFQ|RFP) with suspicious sender or recipient pattern
8d ago
Jan 15th, 2026
Sublime Security
/feeds/core/detection-rules/request-for-quote-or-purchase-rfqorrfp-with-suspicious-sender-or-recipient-pattern-2ac0d329
Link: Common hidden directory observed
10d ago
Jan 13th, 2026
Sublime Security
/feeds/core/detection-rules/link-common-hidden-directory-observed-9f316da6
Subject: Suspicious bracketed reference
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/subject-suspicious-bracketed-reference-663dbce4
Callback phishing via Intuit service abuse
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/callback-phishing-via-intuit-service-abuse-f2fe1294
Credential phishing: Image as content, short or no body contents
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/credential-phishing-image-as-content-short-or-no-body-contents-01313f38
Service abuse: FlipHTML5 with attachment deception and credential theft language
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/service-abuse-fliphtml5-with-attachment-deception-and-credential-theft-language-02464799
Attachment: Office file with document sharing and browser instruction lures
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-office-file-with-document-sharing-and-browser-instruction-lures-b1250a4b
Attachment: File execution via Javascript
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-file-execution-via-javascript-627ae0b1
Attachment: Macro files containing MHT content
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-macro-files-containing-mht-content-4d54e40b
Attachment: Embedded VBScript in MHT file (unsolicited)
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-embedded-vbscript-in-mht-file-unsolicited-b30353a6
Attachment: Office file with credential phishing URLs
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-office-file-with-credential-phishing-urls-b2cae98d