
Summary
This detection rule aims to identify messages that contain Wix-encoded hyperlinks which redirect through known bulk mailing service domains. These kinds of links are often used by threat actors to circumvent security measures, as they leverage legitimate services to disguise malicious intents. The rule employs incoming email data, filtering based on the presence of Wix encoding in link structures and a match against a set of predefined bulk mailer root domains. The detection can reveal attempts of credential phishing and malware distribution, which are common attack types associated with such tactics. The severity of these detections is categorized as low, indicating that while they present a risk, the immediate threat may not be critical. However, it is important to monitor and review these incidents to mitigate potential exploits that could lead to unauthorized access or malware infiltration.
Categories
- Web
- Endpoint
- Cloud
Data Sources
- Application Log
- Network Traffic
- User Account
Created: 2026-01-13