Tactic or Technique: Evasion

Evasion techniques help attackers sneak past email security filters by hiding or disguising malicious content. These tactics are designed to fool both traditional scanners and newer AI-based systems by changing how the message is structured or displayed.
You might see phishing content buried under blocks of harmless-looking text, or important details shown as images so they can't be scanned. Some messages break up keywords using hidden HTML or use misspelled words and lookalike characters to trick you into missing the signs.
More advanced versions use JavaScript that reveals the payload only after the message has passed through security checks. Others try to confuse AI systems with prompt injection or strange formatting.
These techniques create gaps in protection and give attackers a better chance of reaching your inbox. Spotting them early is key. The more familiar you are with how these tricks work, the easier it is to catch them before they do damage.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Attachment: Self-sender PDF with minimal content and view prompt
5h ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-self-sender-pdf-with-minimal-content-and-view-prompt-07670a8c
Link: PDF filename impersonation with credential theft language
6h ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/link-pdf-filename-impersonation-with-credential-theft-language-05931513
PayPal invoice abuse
1d ago
Feb 11th, 2026
Sublime Security
/feeds/core/detection-rules/paypal-invoice-abuse-0ff7a0d4
Attachment: QR code with recipient targeting and special characters
3d ago
Feb 9th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09
Reconnaissance: Empty subject with mismatched reply-to from new sender
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/reconnaissance-empty-subject-with-mismatched-reply-to-from-new-sender-12f4bd45
Link: Suspicious go.php redirect with document lure
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/link-suspicious-gophp-redirect-with-document-lure-f3d8c227
Link: URL shortener with copy-paste instructions and credential theft language
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/link-url-shortener-with-copy-paste-instructions-and-credential-theft-language-a0a2c573
Brand impersonation: Microsoft Planner with suspicious link
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-microsoft-planner-with-suspicious-link-ea363c08
Credential phishing: Generic document sharing
7d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/credential-phishing-generic-document-sharing-9f0e1d2c
Attachment: Legal themed message or PDF with suspicious indicators
7d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-legal-themed-message-or-pdf-with-suspicious-indicators-19133301
macOS malware: Compiled AppleScript with document double-extension
7d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/macos-malware-compiled-applescript-with-document-double-extension-9669c169
Link: Common hidden directory observed
9d ago
Feb 3rd, 2026
Sublime Security
/feeds/core/detection-rules/link-common-hidden-directory-observed-9f316da6
Link: Suspicious URL with recipient targeting and special characters
13d ago
Jan 30th, 2026
Sublime Security
/feeds/core/detection-rules/link-suspicious-url-with-recipient-targeting-and-special-characters-e808be3a
Link: 9WOLF phishkit initial landing URI
13d ago
Jan 30th, 2026
Sublime Security
/feeds/core/detection-rules/link-9wolf-phishkit-initial-landing-uri-a165e206
Attachment: QR code with encoded recipient targeting and redirect indicators
13d ago
Jan 30th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-encoded-recipient-targeting-and-redirect-indicators-5d51e565
Link: URL fragment with hexadecimal pattern obfuscation
14d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/link-url-fragment-with-hexadecimal-pattern-obfuscation-51f51aa0
Attachment: ICS with embedded Javascript in SVG file
14d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-ics-with-embedded-javascript-in-svg-file-d5201a19
Link: HTML file with suspicious binary fragment ending pattern
14d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/link-html-file-with-suspicious-binary-fragment-ending-pattern-dc5e3700
Link: Base64 encoded recipient address in URL fragment with hex subdomain
14d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/link-base64-encoded-recipient-address-in-url-fragment-with-hex-subdomain-781e86ae
Attachment: Office file with document sharing and browser instruction lures
14d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-office-file-with-document-sharing-and-browser-instruction-lures-b1250a4b