Tactic or Technique: Free file host

Phishing attacks often use trusted file-sharing platforms like Google Drive, OneDrive, or Dropbox to deliver malicious content. Instead of attaching malware directly to an email, they send a link to a hosted file that contains a phishing page, ransomware, or another type of malicious payload.
Because these services are widely used and trusted, the links don’t always look suspicious—and many security tools allow them by default. Encrypted connections make it harder to inspect the content, and the familiar branding gives the message an added layer of credibility.
This tactic is effective because it blends in with everyday workflows. A file share link feels normal, especially if it’s framed as a contract, invoice, or shared HR document. That’s why it often gets past both technical defenses and human intuition. Without cloud-aware security controls or strong user training, it’s easy for one click to lead to compromise.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Service abuse: Suspicious Zoom Docs link
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-suspicious-zoom-docs-link-064b2594
Service abuse: Google Drive share from new reply-to domain
22d ago
Nov 13th, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-google-drive-share-from-new-reply-to-domain-c1a2d367
Brand impersonation: Fake Fax
22d ago
Nov 13th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-fake-fax-2a96b90a
Brand impersonation: Microsoft with low reputation links
27d ago
Nov 8th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6
Attachment: EML file with IPFS links
1mo ago
Nov 4th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-eml-file-with-ipfs-links-1fe9d7e7
Service abuse: FlipHTML5 with attachment deception and credential theft language
1mo ago
Oct 30th, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-fliphtml5-with-attachment-deception-and-credential-theft-language-02464799
Service abuse: SendThisFile with credential theft and financial language
1mo ago
Oct 27th, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-sendthisfile-with-credential-theft-and-financial-language-c1ebf25b
Service abuse: Adobe Creative Cloud share from an unsolicited sender address
1mo ago
Oct 22nd, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-adobe-creative-cloud-share-from-an-unsolicited-sender-address-47e42ca1
Fake scan-to-email message
1mo ago
Oct 17th, 2025
Sublime Security
/feeds/core/detection-rules/fake-scan-to-email-message-78851fbe
Canva design with suspicious embedded link
2mo ago
Sep 29th, 2025
Sublime Security
/feeds/core/detection-rules/canva-design-with-suspicious-embedded-link-02959e22
Link: PDF and financial display text to free file host
2mo ago
Sep 24th, 2025
Sublime Security
/feeds/core/detection-rules/link-pdf-and-financial-display-text-to-free-file-host-b010740b
Attachment: Fake scan-to-email
2mo ago
Sep 22nd, 2025
Sublime Security
/feeds/core/detection-rules/attachment-fake-scan-to-email-ea850cc1
Cloud storage impersonation with credential theft indicators
2mo ago
Sep 22nd, 2025
Sublime Security
/feeds/core/detection-rules/cloud-storage-impersonation-with-credential-theft-indicators-4c20f72c
Zoom Events newsletter abuse
2mo ago
Sep 22nd, 2025
Sublime Security
/feeds/core/detection-rules/zoom-events-newsletter-abuse-c8fce846
Suspicious Links to Cloudflare R2 and Edge Services
2mo ago
Sep 20th, 2025
Sublime Security
/feeds/core/detection-rules/suspicious-links-to-cloudflare-r2-and-edge-services-5dd3e5c8
Link: Free file hosting with undisclosed recipients
2mo ago
Sep 11th, 2025
Sublime Security
/feeds/core/detection-rules/link-free-file-hosting-with-undisclosed-recipients-b6281306
Link: Secure SharePoint file share from new or unusual sender
3mo ago
Sep 5th, 2025
Sublime Security
/feeds/core/detection-rules/link-secure-sharepoint-file-share-from-new-or-unusual-sender-74ed3020
Link: Multistage Landing - Abused Buildin.ai
3mo ago
Sep 5th, 2025
Sublime Security
/feeds/core/detection-rules/link-multistage-landing-abused-buildinai-e0a79ef5
File sharing link from suspicious sender domain
3mo ago
Aug 27th, 2025
Sublime Security
/feeds/core/detection-rules/file-sharing-link-from-suspicious-sender-domain-95f20354
Service abuse: DocuSign share from an unsolicited reply-to address
3mo ago
Aug 26th, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-docusign-share-from-an-unsolicited-reply-to-address-2f12d616