Detection Method: Optical Character Recognition

OCR (Optical Character Recognition) helps systems read and analyze text in images, screenshots, and scanned documents. This method turns visual text into machine-readable content, allowing your security tools to catch things that would normally slip past text-based filters.
OCR can help you detect:
  • Phishing text hidden in images to bypass text-based filters
  • Suspicious language or instructions in scanned documents
  • QR codes with malicious links
  • Brand impersonation attempts using image-based logos or text
  • Requests for sensitive information disguised in images
For example, attackers often embed fake login prompts or instructions to call a "customer support" number in images. These tricks are designed to bypass traditional security filters, but OCR can extract and analyze the text to flag it as malicious before it reaches you.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Cloud storage impersonation with credential theft indicators
21h ago
Mar 13th, 2026
Sublime Security
Brand impersonation: SendGrid
2d ago
Mar 12th, 2026
Sublime Security
Link: Figma design deck with credential theft language
10d ago
Mar 4th, 2026
Sublime Security
Impersonation: Recipient organization in sender display name with credential theft image
25d ago
Feb 17th, 2026
Sublime Security
Brand impersonation: TikTok
30d ago
Feb 12th, 2026
Sublime Security
Brand impersonation: Fake Fax
1mo ago
Feb 5th, 2026
Sublime Security
Attachment: Legal themed message or PDF with suspicious indicators
1mo ago
Feb 5th, 2026
Sublime Security
Attachment: Office file with document sharing and browser instruction lures
1mo ago
Jan 29th, 2026
Sublime Security
Link: Microsoft Dynamics 365 form phishing
1mo ago
Jan 27th, 2026
Sublime Security
Attachment: Fake lawyer & sports agent identities
1mo ago
Jan 26th, 2026
Sublime Security
Callback phishing in body or attachment (untrusted sender)
1mo ago
Jan 22nd, 2026
Sublime Security
Attachment: Invoice and W-9 PDFs with suspicious creators
1mo ago
Jan 21st, 2026
Sublime Security
Open Redirect: Google domain with /url path and suspicious indicators
2mo ago
Jan 12th, 2026
Sublime Security
Link to auto-downloaded file with Google Drive branding
2mo ago
Jan 12th, 2026
Sublime Security
Brand impersonation: Microsoft with low reputation links
2mo ago
Jan 12th, 2026
Sublime Security
Link: Multistage landing - Abused Adobe Acrobat hosted PDF
2mo ago
Jan 12th, 2026
Sublime Security
Link: Multistage landing - Scribd document
2mo ago
Jan 12th, 2026
Sublime Security
Suspicious recipient pattern and language with low reputation link to login
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: Microsoft 365 credential phishing
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
2mo ago
Jan 12th, 2026
Sublime Security