Tactic or Technique: Evasion

Evasion techniques help attackers sneak past email security filters by hiding or disguising malicious content. These tactics are designed to fool both traditional scanners and newer AI-based systems by changing how the message is structured or displayed.
You might see phishing content buried under blocks of harmless-looking text, or important details shown as images so they can't be scanned. Some messages break up keywords using hidden HTML or use misspelled words and lookalike characters to trick you into missing the signs.
More advanced versions use JavaScript that reveals the payload only after the message has passed through security checks. Others try to confuse AI systems with prompt injection or strange formatting.
These techniques create gaps in protection and give attackers a better chance of reaching your inbox. Spotting them early is key. The more familiar you are with how these tricks work, the easier it is to catch them before they do damage.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Credential phishing: Generic document sharing
3d ago
Feb 14th, 2026
Sublime Security
/feeds/core/detection-rules/credential-phishing-generic-document-sharing-9f0e1d2c
Link: Credential theft with invisible Unicode character in page title from unsolicited sender
4d ago
Feb 13th, 2026
Sublime Security
/feeds/core/detection-rules/link-credential-theft-with-invisible-unicode-character-in-page-title-from-unsolicited-sender-5fe14d53
Link: Suspicious SharePoint document name
4d ago
Feb 13th, 2026
Sublime Security
/feeds/core/detection-rules/link-suspicious-sharepoint-document-name-f95fee6e
Attachment: Self-sender PDF with minimal content and view prompt
5d ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-self-sender-pdf-with-minimal-content-and-view-prompt-07670a8c
Link: PDF filename impersonation with credential theft language
5d ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/link-pdf-filename-impersonation-with-credential-theft-language-05931513
PayPal invoice abuse
6d ago
Feb 11th, 2026
Sublime Security
/feeds/core/detection-rules/paypal-invoice-abuse-0ff7a0d4
Attachment: QR code with recipient targeting and special characters
8d ago
Feb 9th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09
Reconnaissance: Empty subject with mismatched reply-to from new sender
11d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/reconnaissance-empty-subject-with-mismatched-reply-to-from-new-sender-12f4bd45
Link: Suspicious go.php redirect with document lure
11d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/link-suspicious-gophp-redirect-with-document-lure-f3d8c227
Link: URL shortener with copy-paste instructions and credential theft language
11d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/link-url-shortener-with-copy-paste-instructions-and-credential-theft-language-a0a2c573
Brand impersonation: Microsoft Planner with suspicious link
11d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-microsoft-planner-with-suspicious-link-ea363c08
Attachment: Legal themed message or PDF with suspicious indicators
12d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-legal-themed-message-or-pdf-with-suspicious-indicators-19133301
macOS malware: Compiled AppleScript with document double-extension
12d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/macos-malware-compiled-applescript-with-document-double-extension-9669c169
Link: Common hidden directory observed
14d ago
Feb 3rd, 2026
Sublime Security
/feeds/core/detection-rules/link-common-hidden-directory-observed-9f316da6
Link: 9WOLF phishkit initial landing URI
18d ago
Jan 30th, 2026
Sublime Security
/feeds/core/detection-rules/link-9wolf-phishkit-initial-landing-uri-a165e206
Link: Suspicious URL with recipient targeting and special characters
18d ago
Jan 30th, 2026
Sublime Security
/feeds/core/detection-rules/link-suspicious-url-with-recipient-targeting-and-special-characters-e808be3a
Attachment: QR code with encoded recipient targeting and redirect indicators
18d ago
Jan 30th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-encoded-recipient-targeting-and-redirect-indicators-5d51e565
Link: URL fragment with hexadecimal pattern obfuscation
19d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/link-url-fragment-with-hexadecimal-pattern-obfuscation-51f51aa0
Attachment: ICS with embedded Javascript in SVG file
19d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-ics-with-embedded-javascript-in-svg-file-d5201a19
Link: HTML file with suspicious binary fragment ending pattern
19d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/link-html-file-with-suspicious-binary-fragment-ending-pattern-dc5e3700