







Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Attachment: Self-sender PDF with minimal content and view prompt | 5h ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-self-sender-pdf-with-minimal-content-and-view-prompt-07670a8c | |
Link: PDF filename impersonation with credential theft language | 6h ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-pdf-filename-impersonation-with-credential-theft-language-05931513 | |
Attachment: Legal themed message or PDF with suspicious indicators | 7d ago Feb 5th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-legal-themed-message-or-pdf-with-suspicious-indicators-19133301 | |
Attachment: PDF contains W9 or invoice YARA signatures | 8d ago Feb 4th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-contains-w9-or-invoice-yara-signatures-9a8e8a98 | |
Attachment: Password-protected PDF with fake document indicators | 22d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-password-protected-pdf-with-fake-document-indicators-b45e4440 | |
Attachment: PDF with recipient email in link | 22d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-recipient-email-in-link-0399d08f | |
Attachment: Invoice and W-9 PDFs with suspicious creators | 22d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-invoice-and-w-9-pdfs-with-suspicious-creators-305d6e32 | |
Stripe invoice abuse | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/stripe-invoice-abuse-90162d16 | |
URLhaus: Malicious domain in message body or pdf attachment (trusted reporters) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/urlhaus-malicious-domain-in-message-body-or-pdf-attachment-trusted-reporters-cfca2986 | |
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-credential-theft-language-and-link-to-a-free-subdomain-unsolicited-90f4ef4e | |
Sharepoint link likely unrelated to sender | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/sharepoint-link-likely-unrelated-to-sender-6870f489 | |
Attachment: QR code with userinfo portion | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-userinfo-portion-9d62cc5c | |
Brand impersonation: Adobe (QR code) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-adobe-qr-code-2fc36c6d | |
Attachment: Archive with pdf, txt and wsf files | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-archive-with-pdf-txt-and-wsf-files-16b2e239 | |
Brand impersonation: Microsoft (QR code) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-qr-code-ed0f772a | |
Attachment: PDF with suspicious language and redirect to suspicious file type | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-suspicious-language-and-redirect-to-suspicious-file-type-adda3c3f | |
Attachment: DocuSign impersonation via PDF linking to new domain | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-docusign-impersonation-via-pdf-linking-to-new-domain-f0c96282 | |
Attachment: PDF file with link to fake Bitcoin exchange | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-file-with-link-to-fake-bitcoin-exchange-47601cb7 | |
Attachment: PDF with link to DMG file download | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-link-to-dmg-file-download-2c486fe0 | |
PDF attachment with Google (AE) redirecting to a php or zip file | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/pdf-attachment-with-google-ae-redirecting-to-a-php-or-zip-file-57ae513f |