Tactic or Technique: Scripting

Attackers use scripting languages like JavaScript, VBScript, and PowerShell to run malicious code delivered through phishing emails or compromised websites. These scripts can load hidden content, redirect you to phishing pages, or silently steal data in the background.
To avoid detection, attackers often scramble the code using encryption, compression, or multiple layers of encoding. This makes it harder for both security tools and analysts to understand what the script is doing.
Scripting is flexible and often used to fingerprint your browser, deliver customized payloads, or create a connection to an attacker-controlled server. Once that connection is active, the script can pull down more malware, collect sensitive information, or give an attacker continued access to your device.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Attachment: HTML attachment with login portal indicators
11d ago
Jan 12th, 2026
@ajpc500
/feeds/core/detection-rules/attachment-html-attachment-with-login-portal-indicators-3aabf4a7
Attachment: HTML smuggling with auto-downloaded file
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-with-auto-downloaded-file-abf724f5
Attachment: HTML smuggling 'body onload' linking to suspicious destination
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-body-onload-linking-to-suspicious-destination-c1e2beed
Attachment: HTML smuggling with concatenation obfuscation
11d ago
Jan 12th, 2026
@vector_sec
/feeds/core/detection-rules/attachment-html-smuggling-with-concatenation-obfuscation-108ab346
Attachment: HTML smuggling with decimal encoding
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-with-decimal-encoding-f99213c4
Attachment: HTML smuggling with eval and atob
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-with-eval-and-atob-9f521ca2
Attachment: HTML smuggling with base64 encoded JavaScript function
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-with-base64-encoded-javascript-function-4e8a12ec
Attachment: HTML smuggling with excessive line break obfuscation
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-with-excessive-line-break-obfuscation-7e901440
Attachment: HTML smuggling with RC4 decryption
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-with-rc4-decryption-3a46d765
Attachment: HTML smuggling with setTimeout
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-with-settimeout-4e0b2c32
Attachment: HTML smuggling 'body onload' with high entropy and suspicious text
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-body-onload-with-high-entropy-and-suspicious-text-329ac12d
Attachment: HTML smuggling with unescape
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-with-unescape-0b0fed36
Attachment: File execution via Javascript
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-file-execution-via-javascript-627ae0b1
Attachment: LNK with embedded content
11d ago
Jan 12th, 2026
@ajpc500
/feeds/core/detection-rules/attachment-lnk-with-embedded-content-41452f7a
Attachment: Macro files containing MHT content
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-macro-files-containing-mht-content-4d54e40b
Attachment: Malicious OneNote commands
11d ago
Jan 12th, 2026
@Kyle_Parrish_
/feeds/core/detection-rules/attachment-malicious-onenote-commands-7319f0eb
Attachment: Embedded VBScript in MHT file (unsolicited)
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-embedded-vbscript-in-mht-file-unsolicited-b30353a6
Attachment: Office document with VSTO add-in
11d ago
Jan 12th, 2026
@vector_sec
/feeds/core/detection-rules/attachment-office-document-with-vsto-add-in-27afa730
Attachment: Office file with suspicious function calls or downloaded file path
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-office-file-with-suspicious-function-calls-or-downloaded-file-path-4c78b969
Attachment: PowerPoint with suspicious hyperlink
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-powerpoint-with-suspicious-hyperlink-0a999fb1