Tactic or Technique: Free file host

Phishing attacks often use trusted file-sharing platforms like Google Drive, OneDrive, or Dropbox to deliver malicious content. Instead of attaching malware directly to an email, they send a link to a hosted file that contains a phishing page, ransomware, or another type of malicious payload.
Because these services are widely used and trusted, the links don’t always look suspicious—and many security tools allow them by default. Encrypted connections make it harder to inspect the content, and the familiar branding gives the message an added layer of credibility.
This tactic is effective because it blends in with everyday workflows. A file share link feels normal, especially if it’s framed as a contract, invoice, or shared HR document. That’s why it often gets past both technical defenses and human intuition. Without cloud-aware security controls or strong user training, it’s easy for one click to lead to compromise.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Link: Tax document lure Portuguese/Spanish with suspicious domains
6d ago
Apr 14th, 2026
Sublime Security
Cloud storage impersonation with credential theft indicators
11d ago
Apr 9th, 2026
Sublime Security
Service abuse: GitHub notification with excessive mentions and suspicious links
13d ago
Apr 7th, 2026
Sublime Security
Link: Personalized URL with recipient address on commonly abused web service
19d ago
Apr 1st, 2026
Sublime Security
Attachment: ICS file with AWS Lambda URL
19d ago
Apr 1st, 2026
Sublime Security
Service abuse: Behance document sharing with suspicious language
24d ago
Mar 27th, 2026
Sublime Security
Attachment: PDF bid/proposal lure with credential theft indicators
24d ago
Mar 27th, 2026
Sublime Security
Link: Financial account issue with suspicious indicators
27d ago
Mar 24th, 2026
Sublime Security
Link: Free file hosting with undisclosed recipients
1mo ago
Mar 19th, 2026
Sublime Security
Link: Suspicious SharePoint document name
1mo ago
Mar 17th, 2026
Sublime Security
Service abuse: Google OAuth with suspicious redirect destination
1mo ago
Mar 12th, 2026
Sublime Security
Link: Commonly Abused Web Service redirecting to ZIP file
1mo ago
Mar 10th, 2026
Sublime Security
Link: Figma design deck with credential theft language
1mo ago
Mar 4th, 2026
Sublime Security
Service abuse: DocSend share from an unsolicited reply-to address
1mo ago
Mar 4th, 2026
Sublime Security
Link: SharePoint OneNote or PDF link with self sender behavior
1mo ago
Feb 27th, 2026
Sublime Security
Link: Multistage landing - ClickUp abuse
1mo ago
Feb 27th, 2026
Sublime Security
Attachment: PDF with multistage landing - ClickUp abuse
1mo ago
Feb 27th, 2026
Sublime Security
Link: URL redirecting to blob URL
1mo ago
Feb 24th, 2026
Sublime Security
File sharing link with a suspicious subject
2mo ago
Feb 17th, 2026
Sublime Security
File sharing link from suspicious sender domain
2mo ago
Feb 13th, 2026
Sublime Security