Tactic or Technique: Free subdomain host

Attackers often use free subdomain hosting platforms—like *.web.app, *.netlify.app, or *.github.io—to create phishing sites that look more trustworthy than they are. These services let anyone spin up a website under a well-known domain, which helps malicious pages inherit the reputation of the larger platform.
When you get a phishing email with a link to one of these subdomains, the parent domain may look familiar and safe. But the subdomain itself often hosts fake login pages or malware downloads, making it hard to tell what’s real and what’s not.
Because these hosting providers are widely used for legitimate purposes, blocking them outright isn’t practical for most organizations. That makes this tactic especially tricky—it hides malicious content behind domains people trust, and it forces defenders to find more precise ways to detect threats without disrupting day-to-day business.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Link: File sharing impersonation with suspicious language and sending patterns
12d ago
Apr 30th, 2026
Sublime Security
Brand impersonation: Fake Fax
12d ago
Apr 30th, 2026
Sublime Security
Attachment: Calendar invite with suspicious link leading to an open redirect
14d ago
Apr 28th, 2026
Sublime Security
Attachment: HTML smuggling Microsoft sign in
15d ago
Apr 27th, 2026
Sublime Security
Credential phishing: Onedrive impersonation
15d ago
Apr 27th, 2026
Sublime Security
Self-sender with copy/paste instructions and suspicious domains (French/Français)
26d ago
Apr 16th, 2026
Sublime Security
Link: Tax document lure Portuguese/Spanish with suspicious domains
28d ago
Apr 14th, 2026
Sublime Security
Service abuse: GitHub notification with excessive mentions and suspicious links
1mo ago
Apr 7th, 2026
Sublime Security
Service abuse: Google Firebase sender address with suspicious content
1mo ago
Apr 2nd, 2026
Sublime Security
Attachment: PDF bid/proposal lure with credential theft indicators
1mo ago
Mar 27th, 2026
Sublime Security
Link: Financial account issue with suspicious indicators
1mo ago
Mar 24th, 2026
Sublime Security
Link: Free file hosting with undisclosed recipients
1mo ago
Mar 19th, 2026
Sublime Security
Service abuse: Google OAuth with suspicious redirect destination
2mo ago
Mar 12th, 2026
Sublime Security
Link: Commonly Abused Web Service redirecting to ZIP file
2mo ago
Mar 10th, 2026
Sublime Security
Link: Blogspot hosting explicit romance content
2mo ago
Mar 9th, 2026
Sublime Security
Link: Multistage landing - ClickUp abuse
2mo ago
Feb 27th, 2026
Sublime Security
Attachment: PDF with multistage landing - ClickUp abuse
2mo ago
Feb 27th, 2026
Sublime Security
Link: WordPress login page with Blogspot Binance scam
2mo ago
Feb 17th, 2026
Sublime Security
ClickFunnels link infrastructure abuse
3mo ago
Feb 5th, 2026
Sublime Security
Link: Tycoon2FA phishing kit (non-exhaustive)
3mo ago
Jan 23rd, 2026
Sublime Security