Sublime Security Profile Banner
Sublime Security Profile
Sublime Security

@sublime_sec

1,870
Followers
18
Following
59
Media
232
Statuses

The free and open platform for preventing email attacks like BEC, malware, and phishing using AI and a transparent detection engine.

Joined June 2018
Don't wanna be here? Send us removal request.
Pinned Tweet
@sublime_sec
Sublime Security
17 days
Big news today! 🎉 Read more about our funding announcement and where we're headed next:
@jkamdjou
Josh Kamdjou
17 days
I’m extremely excited to announce that @sublime_sec has raised a $20M Series A led by @indexventures with participation from @DAlperovitch I wrote about our journey from black box to open platform, and where we're headed:
23
37
147
2
9
34
@sublime_sec
Sublime Security
4 years
We've open sourced the lists we maintain and use primarily for phishing defense. Includes: - free email providers - free subdomain hosts - url shorteners - suspicious content - many more Contributions welcome.
2
66
185
@sublime_sec
Sublime Security
1 year
Defenders know their environments better than anyone, but they haven't been able to truly capitalize on that knowledge in email — until today. Sublime Platform is now generally available. Deploy in minutes using Docker, for free.
1
30
80
@sublime_sec
Sublime Security
5 months
We've observed an increase in attackers abusing legitimate, high reputation services such as DocuSign to deliver callback phishing attacks. These are actual messages from DocuSign, and pass SPF/DKIM/DMARC. In the past, we've observed this via PayPal Invoice abuse and others.
Tweet media one
3
34
79
@sublime_sec
Sublime Security
11 months
Sublime has observed an increase in QR code credential phishing attacks over the past several weeks. We've enabled a new scanner to decode QR codes embedded in message bodies or attachments, and pushed new coverage to prevent these attacks:
Tweet media one
4
25
76
@sublime_sec
Sublime Security
7 months
It's been a busy week for QR code phishing, so @samkscholten put together a deep dive on how Sublime detects and decodes these email attacks with our open source rules:
Tweet media one
5
14
61
@sublime_sec
Sublime Security
1 year
Announcing Whois enrichments: You can now block email messages from newly registered domains. Whois is available as a new MQL function, beta.whois(), so you can enrich any domain in the message including the sender, link domains, or domains found in attachments.
Tweet media one
2
7
45
@sublime_sec
Sublime Security
5 months
We're excited to launch Attack Surface Reduction for email. On endpoints, app allowlisting leaves attackers with fewer ways to perform attacks. On networks, Secure Web Gateways can block outbound requests to new domains. Now, you can do the same in Microsoft 365 & Google 🧵
Tweet media one
1
7
35
@sublime_sec
Sublime Security
1 year
New blog: @filar shares how Sublime uses Siamese Neural Networks, Object Detection, and other signals within MQL to identify credential phishing attacks.
0
11
33
@sublime_sec
Sublime Security
1 year
You can now use MQL to detect HTML Smuggling attacks delivered via email body links. Detect+block+hunt for these techniques, recently observed to deliver Qakbot and other malware: - URL->Encrypted zip->ISO - URL->Zip->ISO->LNK - URL->Zip->IMG->VBS - and more How it works:
Tweet media one
2
9
33
@sublime_sec
Sublime Security
5 years
We’re very excited to finally write about @emailrepio , a free API we released for querying email reputation. It’s been invaluable for #phishing defense and now supports reporting of malicious senders from trusted researchers and organizations.
0
24
32
@sublime_sec
Sublime Security
9 months
👋 In Chicago at #BlueTeamCon ? Come say hi to @ianthiel and @jkamdjou and grab some special edition RFC5322 swag!
Tweet media one
0
7
31
@sublime_sec
Sublime Security
1 year
We're excited to launch Sublime Thoughts: our new Blog. Our first post features @rw_access introducing the magic behind Sublime: Message Query Language (MQL), the first universal DSL purpose-built for preventing email attacks, threat hunting, and more.
Tweet media one
1
18
28
@sublime_sec
Sublime Security
9 months
almost time 👀
Tweet media one
8
1
27
@sublime_sec
Sublime Security
5 months
We've released a new detection for an ongoing Pikabot campaign: This covers both behavioral detection of the delivery technique (Plaintext URL -> Archive -> JS) as well as IOCs in @abuse_ch URLhaus + MalwareBazaar h/t @affje0x65 @k3dg3 @samkscholten
0
8
24
@sublime_sec
Sublime Security
7 months
Today we released public Rule pages for all Rules in the Sublime Core Feed! These pages make it easier to share Sublime Rules with your favorite security peers or team members.
1
11
24
@sublime_sec
Sublime Security
4 months
Sublime has observed credential phishing actors leveraging legitimate Dropbox infrastructure to deliver malicious links. In this sample, the actors also leverage a known callback phishing technique - Geek Squad impersonation (via a lookalike "GeekSupport" to avoid detection) -…
Tweet media one
1
8
21
@sublime_sec
Sublime Security
6 months
We've observed an uptick in QR Code phishing attacks that impersonate a DocuSign message. The recipient's brand logo (blurred at the top of the message) is leveraged to bolster legitimacy. Scanning the QR Code takes users to a Microsoft credential phishing page. h/t…
Tweet media one
1
11
20
@sublime_sec
Sublime Security
10 months
Excited to share that Founder/CEO @jkamdjou and @ajpc500 , Co-Founder of @delivr_to , will lead a @defcon workshop on email detection engineering & threat hunting! Get insights on how to defend against the latest techniques used to deliver QakBot/Emotet, BEC, HTML smuggling, +
Tweet media one
1
11
20
@sublime_sec
Sublime Security
1 year
We've pushed a new detection/hunt rule live for this technique delivering Emotet, shoutout @samkscholten and @Cryptolaemus1 :
Tweet media one
@Cryptolaemus1
Cryptolaemus
1 year
🚨Emotet Awakens🚨 As of 1200UTC Ivan finally got E4 to send spam. We are seeing Red Dawn templates that are very large coming in at over 500MB. Currently seeing a decent flow of spam. Septet of payload URLs and ugly macros. Sample: 1/3
Tweet media one
2
110
201
1
9
19
@sublime_sec
Sublime Security
9 months
A teaser wouldn’t be a teaser if we showed the entire thing right? Follow @jkamdjou and @ianthiel during #DEFCON31 to find out where they’ll be to say hello and snag this year’s exclusive swag! 🧝‍♂️❤️‍🔥✉️
Tweet media one
3
2
18
@sublime_sec
Sublime Security
1 year
Announcing job scam detection using our Natural Language Understanding (NLU) model. Our NLU model now supports a new intent classification, job scam, to detect messages that contain money-laundering, identity theft, or pay-to-work scams. New Feed Rule:
Tweet media one
3
6
18
@sublime_sec
Sublime Security
7 months
We're excited to share Sublime now supports integration w/ Microsoft 365 tenants running in GCC and GCC High, Microsoft’s cloud platform for cleared personnel and orgs supporting the Dept of Defense.
Tweet media one
1
2
17
@sublime_sec
Sublime Security
2 months
New @tines_hq / @Anomali / @sublime_sec story just dropped. Collect data on threat actors from Anomali ThreatStream and block observables in mail flow using Sublime:
Tweet media one
1
4
15
@sublime_sec
Sublime Security
1 year
New blog from @filar : What makes BEC attacks hard to identify, and how Natural Language Understanding (NLU) + Message Query Language (MQL) can detect and prevent these threats at scale.
Tweet media one
1
7
15
@sublime_sec
Sublime Security
5 months
Callback Phishing may seem like a low-level nuisance, but its impact can be quite devastating. We wrote about that here and documented our interactions with a scammer:
@sublime_sec
Sublime Security
5 months
We've observed an increase in attackers abusing legitimate, high reputation services such as DocuSign to deliver callback phishing attacks. These are actual messages from DocuSign, and pass SPF/DKIM/DMARC. In the past, we've observed this via PayPal Invoice abuse and others.
Tweet media one
3
34
79
0
5
14
@sublime_sec
Sublime Security
1 year
New detection rule live from @samkscholten for this recent Qakbot technique: Attachment archive with WSF file Deploy this now to block, or Hunt. For free.
@pr0xylife
proxylife
1 year
#Qakbot - azd - .zip > .wsf > (decoy .pdf) > .dll WScript.exe Adobe Cloud Certificate 133337.wsf rundll32.exe C:\ProgramData\Z6x9E9.SmcisaK,Wind Samples 👇 IOC's
Tweet media one
3
34
122
0
4
12
@sublime_sec
Sublime Security
2 months
Sublime 🤝 Tines
@tines_labs
Tines Labs
2 months
Check out our latest @tines_hq story! Analysts alert users about their phishing reports via @sublime_sec , ensuring crucial feedback is provided. Stay posted for more! 👇
1
3
9
0
5
12
@sublime_sec
Sublime Security
4 months
Join us for the next detection workshop in two weeks! @jkamdjou and @ajpc500 will take you through the latest QR code and callback phishing attacks + how to hunt for them in a lab environment. Register here:
Tweet media one
0
3
12
@sublime_sec
Sublime Security
10 months
Come check out our integration w/ @securityonion at the @BlackHatEvents 2023 Arsenal on Aug 9 at 10am PT!
Tweet media one
@jkamdjou
Josh Kamdjou
10 months
Tweet media one
4
4
28
1
7
12
@sublime_sec
Sublime Security
18 days
See you at RSAC 2024 in two weeks! Catch up with us on all things email security at: - booth 6184 in the North Expo - a jam session with @jkamdjou and @ianthiel - happy hour w/ our friends @limacharlieio and @runpanther Full details here:
Tweet media one
0
4
12
@sublime_sec
Sublime Security
5 months
The Sublime Team is headed to London next week! 🎡 See you at @BSidesLondon on 9th Dec for @jkamdjou ’s talk on the latest social engineering techniques like QR code phishing and HTML smuggling:
Tweet media one
1
3
12
@sublime_sec
Sublime Security
3 years
Announcing dynamic system lists. Sublime rules can now leverage basic historical context to answer questions like: - Has this sender's email address or domain ever contacted my organization before? - Has anyone in my organization contacted this sender's email or domain before?
Tweet media one
1
2
11
@sublime_sec
Sublime Security
5 months
The sender's display name is also impersonated, and the attacker has control over the subject.
Tweet media one
1
1
10
@sublime_sec
Sublime Security
8 months
ICYMI listen to @jkamdjou and @riskybusiness discuss all things email security and threats, advances in email detection engineering, ML/NLU, and more:
Tweet media one
0
3
11
@sublime_sec
Sublime Security
3 months
Sublime Core & Enterprise users: next time you access the flagged messages alert queue, you’ll see an updated interface to expedite your triage actions and investigation workflow.
Tweet media one
1
4
11
@sublime_sec
Sublime Security
5 months
PayPal invoicing abuse earlier this year:
@jkamdjou
Josh Kamdjou
1 year
We’ve seen these @sublime_sec quite a bit - they’re abusing a legit PayPal service/API so it’s actually coming from them and passing SPF/DMARC. A generic greeting without the user’s name is one of the dead giveaways
Tweet media one
1
1
16
0
3
10
@sublime_sec
Sublime Security
7 months
Join us Oct 24 & 26 at our next Email Detection Engineering Workshop! @jkamdjou and @ajpc500 will take you through timely attack types and techniques like QR code phishing, HTML smuggling via links, and more while you hunt for them in a lab environment:
Tweet media one
2
6
11
@sublime_sec
Sublime Security
3 years
New detection rule now live: name: "Malformed URL Prefix" source: | any(body.links, iregex_search(.href_url.url, ':/\\')) references: - Rule file:
0
2
10
@sublime_sec
Sublime Security
9 months
Our DEF CON 31 workshop may be full, but there are some spots still available @BSidesLV on Aug 9. Come hunt for various email attack types in a lab environment w/ @jkamdjou and @ajpc500 !
Tweet media one
2
7
10
@sublime_sec
Sublime Security
1 year
Our blog has an RSS feed now:
Tweet media one
2
1
10
@sublime_sec
Sublime Security
1 year
Announcing historical message ingestion. Sublime now supports rapid ingestion of historical messages, making up to 30 days of message history available for immediate analysis and threat hunting and up to one year of historical context. More here:
Tweet media one
0
3
9
@sublime_sec
Sublime Security
6 months
We released a new Natural Language Understanding (NLU) tag for advance fee fraud to identify BEC attacks requesting upfront payment in advance of receiving proceeds, money, stock, donations, and more. See how it works in this new Rule:
Tweet media one
2
4
9
@sublime_sec
Sublime Security
3 years
@Andrew___Morris type.inbound and ilike(sender.display_name, "*Andrew Morris*")
1
0
8
@sublime_sec
Sublime Security
4 years
0
3
8
@sublime_sec
Sublime Security
3 years
Announcing arbitrary Webhook actions. Write a rule to flag any type of behavior in your email environment, set it active on any or all of the mailboxes in your domain, and trigger a webhook notification to an arbitrary HTTP(S) endpoint. Available to all free Platform users now.
2
3
7
@sublime_sec
Sublime Security
3 years
We've pushed a new rule to detect this campaign and other open redirects using a similar pattern:
Tweet media one
@MsftSecIntel
Microsoft Threat Intelligence
3 years
We’re tracking a rampant phishing attack that uses DGA domains, free email services, and even compromised email accounts to send massive numbers of phishing emails. These emails are linked by open redirector URLs that begin with a distinct pattern: hxxps://t[.]domain[.]tld/r/?
Tweet media one
Tweet media two
3
223
389
0
1
7
@sublime_sec
Sublime Security
7 months
Sublime now offers an AWS CloudFormation template for self-managed deployment to Stockholm (eu-north-1), Canada (ca-central-1), Sydney (ap-southeast-2), and Zurich (eu-central-2)!
Tweet media one
1
2
7
@sublime_sec
Sublime Security
1 month
Sublime is observing callback phishing campaigns leveraging tax-themed lures. These campaigns highlight how attackers continue to use seasonal and timely themes to trick unsuspecting users as the US tax deadline is only a week away. h/t @samkscholten
Tweet media one
1
6
7
@sublime_sec
Sublime Security
7 months
BTW:
Tweet media one
0
0
6
@sublime_sec
Sublime Security
11 months
Not us waiting for the talk date + time to get published 👀
@filar
Bobby Filar
11 months
Excited that my @BSidesLV talk has been accepted! I will be introducing BabbelPhish, our upcoming open source framework for text-to-code generation. I'll also show how @sublime_sec uses LLMs to make it easier for detection engineers to grasp our DSL.
2
6
31
0
1
5
@sublime_sec
Sublime Security
5 months
Sublime Enterprise users can now create a custom in-message warning banner to share org-specific content like security team contact info, how to report suspicious messages, and more.
2
1
6
@sublime_sec
Sublime Security
3 years
Examples: - Send HTML or Zip attachments from external domains to your SOAR, run them in @virustotal or @joe4security - Send links hosted on a free subdomain (like azurewebsites[.]net) to your SOAR and run them in @urlscanio to detect credential phishing
0
2
6
@sublime_sec
Sublime Security
5 months
Historically, it's been hard to do ASR in email for a few reasons: - Black boxes offer little customization or control - Users need to express complex behavior with minimal FPs - With the migration to Cloud email, there's even less control than a traditional mail filter
1
1
5
@sublime_sec
Sublime Security
1 year
Finally, here's another rule to detect URL -> {Archives} -> LNK, JS, or VBA file delivery. Since the initial file download is passed to binexplode(), this means LNKs can be detected several layers deep within archives. Rule source:
Tweet media one
1
0
5
@sublime_sec
Sublime Security
9 days
If you're attending RSA next week: @filar will give a talk at our booth on Tues & Wed at 10:45am. Learn how explainable, transparent machine learning provides much-needed confidence and context in your triage workflow.
Tweet media one
0
2
7
@sublime_sec
Sublime Security
7 months
Last chance to register for the workshop! See you tomorrow
@sublime_sec
Sublime Security
7 months
Join us Oct 24 & 26 at our next Email Detection Engineering Workshop! @jkamdjou and @ajpc500 will take you through timely attack types and techniques like QR code phishing, HTML smuggling via links, and more while you hunt for them in a lab environment:
Tweet media one
2
6
11
0
2
5
@sublime_sec
Sublime Security
5 months
Here's a sample ASR Rule to detect inbound messages from newly registered sender domains that you’ve never spoken to before: type.inbound and beta.whois(sender․email.domain).days_old < 30 and not profile․by_sender().solicited
1
0
5
@sublime_sec
Sublime Security
3 years
Here's a simple detection rule to reduce attack surface from CVE-2021-40444 by alerting on .docx, .rtf, and .pptx attachments *from first-time senders*: type.inbound and any(attachments, .file_type in ('docx', 'pptx', 'rtf')) and sender[.]email[.]email not in $\sender_emails
Tweet media one
1
2
4
@sublime_sec
Sublime Security
7 months
All Core Feed Rules are available including recently created Rules like “QR Code with suspicious indicators” and “Microsoft Brand Impersonation (QR Code)":
1
0
4
@sublime_sec
Sublime Security
1 year
As usual, you can also detect HTML smuggling via attachments directly with binexplode(), like double Base64-encoded zip files in HTML attachments (observed to deliver Qbot, h/t @ajpc500 @pr0xylife ): Rule: BinExplode docs:
Tweet media one
Tweet media two
0
0
4
@sublime_sec
Sublime Security
5 months
ASR Rules are supported in all versions of @sublime_sec , so you can run this completely for free and host it on your own network, or use a Managed instance. Get started here with Core (Free) or Enterprise:
0
0
4
@sublime_sec
Sublime Security
5 months
@jkamdjou
Josh Kamdjou
5 months
@SwiftOnSecurity this has been popping off hard today (trend for Callback Phishing via DocuSign comment: )
Tweet media one
0
0
6
0
0
4
@sublime_sec
Sublime Security
1 year
In a rule written and shared by @ajpc500 for a known Qbot technique, he detects both the html smuggled payload and Adobe brand impersonation using computer vision. Payload + technique reference (h/t ): Rule:
Tweet media one
Tweet media two
1
3
4
@sublime_sec
Sublime Security
3 months
ICYMI hear @jkamdjou discuss all things QR code phishing and detection on this week's Risky Business:
@riskybusiness
Patrick Gray
3 months
This week’s episode of Risky Business is now out, featuring @Metlstorm , @TimWattsMP and @jkamdjou
Tweet media one
1
1
18
2
3
4
@sublime_sec
Sublime Security
1 year
Come hang out with us @BSidesNYC !
@BSidesNYC
#BSidesNYC
1 year
@BSidesNYC welcomes @sublime_sec as a gold sponsor for our conference on April 22, 2023. @sublime_sec alleviates the pain of traditional black box email gateways with detection-as-code and community collaboration.
Tweet media one
0
0
1
0
3
4
@sublime_sec
Sublime Security
5 months
Attack Surface Reduction, or ASR, is all about mitigating the ways an attacker can conduct a successful attack. If a certain behavior is not normal for your environment, you can block it by default and make exceptions when necessary for legitimate behavior.
1
0
4
@sublime_sec
Sublime Security
1 year
Another one by @ajpc500 , used to detect URL->Encrypted Zip->ISO payloads, also recently observed to deliver Qakbot. Rule source: Delivrto reference: h/t @pr0xylife for the original research:
Tweet media one
@pr0xylife
proxylife
1 year
#Qakbot - BB06 - url > .zip > .img > .vbs > .dll Wcript.exe C:\Users\**\AppData\Local\Temp\CV.vbs regsvr32.exe emanated\nissan.tmp Samples 👇 IOC's
Tweet media one
3
33
87
2
1
4
@sublime_sec
Sublime Security
5 months
When an ASR Rule flags, you’ll see an alert in a new view called "Attack Surface Reduction." Similar to Detection and Triage Rules, you can run this in alert-only mode or configure actions to run: Quarantine, Trash, Warning Banner, Webhook, Slack Alert, etc.
1
0
2
@sublime_sec
Sublime Security
5 months
@sublime_sec addresses these challenges in a few ways: - Full control + transparency with Message Query Language (MQL). Alert only, or auto-remediate - MQL can describe complex behavior, and threat hunting lets you verify efficacy - Native integration w/ Google & Microsoft APIs
1
0
3
@sublime_sec
Sublime Security
7 months
@ScottMcGready we’ve been seeing *a lot* of it ITW:
@jkamdjou
Josh Kamdjou
8 months
We’ve observed a new uptick in Microsoft QR Code + DocuSign phishing this morning. Decoded QR code leads to a Microsoft credential phishing page. The technique enables highly sus links like .ru and DNGs to land, which traditionally would likely be sent straight to spam by…
Tweet media one
Tweet media two
3
80
185
0
0
3
@sublime_sec
Sublime Security
7 months
We’d love your input: how can we make these public Rule pages better? Are there other public pages you’d like to see from Sublime? Share in the thread below ⤵️
1
0
3
@sublime_sec
Sublime Security
7 months
It's free to set up and will only take you minutes -
@jkamdjou
Josh Kamdjou
7 months
i am *begging* ya'll, deploy a free @sublime_sec instance to effectively block QR code attacks without impacting legit traffic. you can literally be up and running in production in minutes/hours, and you can self-host it. 🧵on our QR code detections + Platform setup
Tweet media one
4
37
177
1
0
3
@sublime_sec
Sublime Security
4 years
We've updated the repo to include descriptions of each file:
Tweet media one
0
0
3
@sublime_sec
Sublime Security
3 years
Use cases: - Send flagged message events to your SOAR to trigger workflows, like analyzing attachments for malware - Send flagged message events to your SIEM for analytics or correlation - Trigger an AWS Lambda
1
0
3
@sublime_sec
Sublime Security
5 months
To create your own ASR Rules, simply add the “Attack surface reduction” Tag to your Rule. Check out these Core Feed Rules for some inspiration:
1
0
3
@sublime_sec
Sublime Security
1 year
The linkanalysis() MQL function now returns a list of files_downloaded, which can be passed to binexplode() for further analysis. The service uses a headless chrome browser to render the page’s DOM and return any smuggled files. Docs:
Tweet media one
1
0
3
@sublime_sec
Sublime Security
4 months
These campaigns are legitimately from dropbox[.]com and pass sender authentication. The content of the attack is delivered via the comment section of the file share. We've pushed targeted detection coverage here: h/t @samkscholten
0
1
2
@sublime_sec
Sublime Security
3 months
…and more updates to make triage more efficient. We’re also rolling out an updated backtesting and Hunt triage queue soon.
1
0
2
@sublime_sec
Sublime Security
9 months
Previously, Qakbot's unique delivery methods like the PDF > ZIP > WSF technique required a multi-layered approach for detection, as seen in this Sublime Rule:
1
0
2
@sublime_sec
Sublime Security
3 years
Or send a webhook to your favorite SOAR for further investigation:
@sublime_sec
Sublime Security
3 years
Announcing arbitrary Webhook actions. Write a rule to flag any type of behavior in your email environment, set it active on any or all of the mailboxes in your domain, and trigger a webhook notification to an arbitrary HTTP(S) endpoint. Available to all free Platform users now.
2
3
7
1
1
2
@sublime_sec
Sublime Security
5 months
DM us if you still need a ticket! We have a few remaining to share with y'all.
0
0
2
@sublime_sec
Sublime Security
9 months
0
0
2
@sublime_sec
Sublime Security
1 year
For example: analyze the intent of the OCR'd content of a PDF file, inside a zip attachment, from a freemail sender your organization has never communicated with. NLU function docs:
1
0
2
@sublime_sec
Sublime Security
11 months
Sublime Rule Feeds enable you to quickly operationalize new detection rules for emerging threats from others in the community. More info on how to add new Feeds like the @delivr_to Feed here (it only take a couple clicks!):
@delivr_to
delivr.to
11 months
Given SVGs are a permitted attachment type in O365, and can be opened natively by browsers, they present a prime candidate for abuse⚠️ We've added a new @sublime_sec rule to our detections repo to detect SVGs with script blocks in them: 🧵4/5
Tweet media one
1
1
5
0
3
2
@sublime_sec
Sublime Security
10 months
Details on our session w/ @therealwlambert :
0
1
2
@sublime_sec
Sublime Security
2 months
Join us in 20 min:
@limacharlieio
LimaCharlie
2 months
Sublime puts email security directly into the hands of your security teams, enabling proactive defense against email threats through Detection-as-Code and behavioral AI functionalities. Join @_bromiley (Lead Solutions Engineer at LimaCharlie) and @jkamdjou (Founder & CEO of…
0
0
3
0
0
2
@sublime_sec
Sublime Security
7 months
You'll be guided through the rule creation process, utilizing Sublime and YARA, while dissecting faithfully reproduced malware in  @delivr_to 's payload collection.
1
0
1