Tactic or Technique: Open redirect

Attackers abuse open redirect vulnerabilities to make malicious links appear trustworthy. These links begin with a legitimate domain, but when clicked, they send you to a completely different site—often one used for phishing or malware delivery.
It often begins with a link like “trusted-company[.]com/redirect?url=malicious-site[.]com” to bypass filters and build false confidence. Since the domain looks familiar, you’re more likely to trust it and click through. Behind the scenes, you’re immediately redirected to an attacker-controlled page.
This tactic works because many users and security tools only check the start of a URL. It’s frequently used in credential phishing and malware campaigns, especially when combined with realistic branding that makes the message feel like it came from a legitimate source.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Brand impersonation: Microsoft logo or suspicious language with open redirect
13d ago
Apr 29th, 2026
Sublime Security
Attachment: Link to Doubleclick.net open redirect
13d ago
Apr 29th, 2026
Sublime Security
Attachment: Calendar invite with suspicious link leading to an open redirect
14d ago
Apr 28th, 2026
Sublime Security
Attachment: Calendar invite with Google redirect and invoice request
14d ago
Apr 28th, 2026
Sublime Security
Link: Google Calendar invite linking to an open redirect from an untrusted freemail sender
14d ago
Apr 28th, 2026
Sublime Security
Service abuse: Google Tag Manager debug cookie clearing with open redirect potential
15d ago
Apr 27th, 2026
Sublime Security
Link: URL path containing /moni/index
18d ago
Apr 24th, 2026
Sublime Security
Service abuse: Meetup.com redirect with brand impersonation
27d ago
Apr 15th, 2026
Sublime Security
Service abuse: Mimecast URL with excessive path length
1mo ago
Apr 8th, 2026
Sublime Security
Service abuse: Google OAuth with suspicious redirect destination
2mo ago
Mar 12th, 2026
Sublime Security
Link: Commonly Abused Web Service redirecting to ZIP file
2mo ago
Mar 10th, 2026
Sublime Security
Link: Multistage landing - ClickUp abuse
2mo ago
Feb 27th, 2026
Sublime Security
Link: URL redirecting to blob URL
2mo ago
Feb 24th, 2026
Sublime Security
Open redirect: embluemail.com
2mo ago
Feb 12th, 2026
Sublime Security
Attachment: QR code with encoded recipient targeting and redirect indicators
3mo ago
Jan 30th, 2026
Sublime Security
Open redirect: Atdmt
3mo ago
Jan 12th, 2026
@vector_sec
Open redirect: storematch.jp
3mo ago
Jan 12th, 2026
Sublime Security
Low reputation link to auto-downloaded HTML file with smuggling indicators
3mo ago
Jan 12th, 2026
Sublime Security
Open redirect: labcluster.com
3mo ago
Jan 12th, 2026
Sublime Security
Open redirect: LearningApps
3mo ago
Jan 12th, 2026
Sublime Security