According to a recent LinkedIn post from Sublime Security, the company’s research team has observed an emerging phishing technique that uses JavaScript virtual machines embedded in HTML attachments to conceal malicious payloads. The post highlights that Sublime Threat Intelligence and Research (STIR) identified FlowerStorm operators adopting a tool called KrakVM shortly after its public release.
Meet Samuel – Your Personal Investing Prophet
- Start a conversation with TipRanks’ trusted, data-backed investment intelligence
- Ask Samuel about stocks, your portfolio, or the market and get instant, personalized insights in seconds
The post describes a campaign that combines VM-based obfuscation, credential harvesting, and real-time multi-factor authentication interception, indicating a more sophisticated approach to email-borne attacks. It also notes that KrakVM appeared to be used with minimal customization, suggesting that advanced obfuscation methods may be becoming easier for threat actors to deploy.
For investors, this research focus may underscore Sublime Security’s positioning as a specialist in detecting emerging email security threats, potentially enhancing its value proposition versus traditional filters. If such attack techniques gain wider adoption, demand for advanced threat intelligence and adaptive email security solutions could increase, which may support the company’s growth prospects.
The post also implies an opportunity for Sublime Security to deepen relationships with enterprise customers that are concerned about phishing and account takeover risks. By publicly dissecting these attack chains and advising defenders on what to monitor, the firm may strengthen its brand as a thought leader in cybersecurity, which could be strategically important in a competitive market.

