Tactic or Technique: Free subdomain host

Attackers often use free subdomain hosting platforms—like *.web.app, *.netlify.app, or *.github.io—to create phishing sites that look more trustworthy than they are. These services let anyone spin up a website under a well-known domain, which helps malicious pages inherit the reputation of the larger platform.
When you get a phishing email with a link to one of these subdomains, the parent domain may look familiar and safe. But the subdomain itself often hosts fake login pages or malware downloads, making it hard to tell what’s real and what’s not.
Because these hosting providers are widely used for legitimate purposes, blocking them outright isn’t practical for most organizations. That makes this tactic especially tricky—it hides malicious content behind domains people trust, and it forces defenders to find more precise ways to detect threats without disrupting day-to-day business.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Self-sender with copy/paste instructions and suspicious domains (French/Français)
4d ago
Apr 16th, 2026
Sublime Security
Link: Tax document lure Portuguese/Spanish with suspicious domains
6d ago
Apr 14th, 2026
Sublime Security
Service abuse: GitHub notification with excessive mentions and suspicious links
13d ago
Apr 7th, 2026
Sublime Security
Service abuse: Google Firebase sender address with suspicious content
18d ago
Apr 2nd, 2026
Sublime Security
Attachment: PDF bid/proposal lure with credential theft indicators
24d ago
Mar 27th, 2026
Sublime Security
Link: Financial account issue with suspicious indicators
27d ago
Mar 24th, 2026
Sublime Security
Link: Free file hosting with undisclosed recipients
1mo ago
Mar 19th, 2026
Sublime Security
Service abuse: Google OAuth with suspicious redirect destination
1mo ago
Mar 12th, 2026
Sublime Security
Link: Commonly Abused Web Service redirecting to ZIP file
1mo ago
Mar 10th, 2026
Sublime Security
Link: Blogspot hosting explicit romance content
1mo ago
Mar 9th, 2026
Sublime Security
Link: Multistage landing - ClickUp abuse
1mo ago
Feb 27th, 2026
Sublime Security
Attachment: PDF with multistage landing - ClickUp abuse
1mo ago
Feb 27th, 2026
Sublime Security
Link: WordPress login page with Blogspot Binance scam
2mo ago
Feb 17th, 2026
Sublime Security
Brand impersonation: Fake Fax
2mo ago
Feb 5th, 2026
Sublime Security
ClickFunnels link infrastructure abuse
2mo ago
Feb 5th, 2026
Sublime Security
Link: Tycoon2FA phishing kit (non-exhaustive)
2mo ago
Jan 23rd, 2026
Sublime Security
Link: Breely link masquerading as PDF
3mo ago
Jan 16th, 2026
Sublime Security
Free subdomain link with login or captcha (untrusted sender)
3mo ago
Jan 12th, 2026
Sublime Security
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
3mo ago
Jan 12th, 2026
Sublime Security
Low reputation link to auto-downloaded HTML file with smuggling indicators
3mo ago
Jan 12th, 2026
Sublime Security