Detection Method: Javascript analysis

JavaScript analysis inspects JavaScript code found in email messages, HTML attachments, and linked web pages to identify potential malicious behavior or suspicious patterns. It uses specialized techniques to spot obfuscated scripts, malicious functions, and known attack strategies.
JavaScript analysis can help you detect:
  • Obfuscated code designed to hide malicious intent
  • DOM manipulation attempts that lead to phishing or data theft
  • Event handlers that trigger actions when content is viewed
  • Suspicious API calls like document.write() or eval() that generate malicious content
  • Encoded strings that decode to payloads during runtime
For example, attackers often use obfuscated JavaScript to redirect you to phishing sites or to download malware. JavaScript analysis can uncover these threats even when the code is intentionally hidden.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Link: JavaScript obfuscation with Telegram bot integration
1mo ago
Feb 25th, 2026
Sublime Security
Attachment: ICS with embedded Javascript in SVG file
1mo ago
Jan 29th, 2026
Sublime Security
Low reputation link to auto-downloaded HTML file with smuggling indicators
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML attachment with login portal indicators
2mo ago
Jan 12th, 2026
@ajpc500
Attachment: HTML file with reference to recipient and suspicious patterns
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with atob and high entropy
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with auto-downloaded file
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with eval and atob
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with base64 encoded JavaScript function
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with excessive line break obfuscation
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling Microsoft sign in
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with RC4 decryption
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with setTimeout
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with unescape
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: File execution via Javascript
2mo ago
Jan 12th, 2026
Sublime Security
Request for Quote or Purchase (RFQ|RFP) with HTML smuggling attachment
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with eval and atob via calendar invite
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with ROT13
2mo ago
Jan 12th, 2026
@Kyle_Parrish_
Attachment: EML file contains HTML attachment with login portal indicators
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: HTML smuggling with atob and high entropy via calendar invite
2mo ago
Jan 12th, 2026
Sublime Security