Attack Type: Credential Phishing

Credential phishing attacks are designed to steal your login information by tricking you into entering it on fake login pages. These emails impersonate trusted services like Microsoft 365, Google Workspace, or banking sites, using urgent phrases like “verify your account,” “prevent suspension,” or “view shared document” to push you into clicking.
Once you click the link, it leads to a fake login page that looks convincing. If you enter your credentials, the attacker captures them immediately. Common examples include phishing emails pretending to be DocuSign requests, Dropbox links, or HR file shares—things that feel routine but create a false sense of urgency.
Attackers often use real platforms like Microsoft Forms, Google Forms, or compromised websites to host these fake login pages, making the links appear legitimate and harder for security tools to catch. The damage doesn’t stop at just stealing your login. Once attackers gain access, they can move through your organization, steal sensitive data, send internal phishing emails, or even launch a ransomware attack.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Attachment: Self-sender PDF with minimal content and view prompt
5h ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-self-sender-pdf-with-minimal-content-and-view-prompt-07670a8c
Brand impersonation: Dropbox
6h ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-dropbox-61f11d12
Brand impersonation: TikTok
6h ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-tiktok-aaacc8b7
Open redirect: embluemail.com
6h ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/open-redirect-embluemailcom-48c5abd3
Link: PDF filename impersonation with credential theft language
6h ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/link-pdf-filename-impersonation-with-credential-theft-language-05931513
Brand impersonation: Google Meet with malicious link
7h ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-google-meet-with-malicious-link-d488d85a
Attachment: QR code with recipient targeting and special characters
3d ago
Feb 9th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09
Brand impersonation: Navan
3d ago
Feb 9th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-navan-3573e9a8
Reconnaissance: Empty subject with mismatched reply-to from new sender
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/reconnaissance-empty-subject-with-mismatched-reply-to-from-new-sender-12f4bd45
Link: Suspicious go.php redirect with document lure
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/link-suspicious-gophp-redirect-with-document-lure-f3d8c227
Brand Impersonation: Disney
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-disney-bf90b8fb
Link: URL shortener with copy-paste instructions and credential theft language
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/link-url-shortener-with-copy-paste-instructions-and-credential-theft-language-a0a2c573
New link domain (<=10d) from untrusted sender
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/new-link-domain-less10d-from-untrusted-sender-4805b0e6
Link: SharePoint filename matches org name
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/link-sharepoint-filename-matches-org-name-cb954726
Brand impersonation: Microsoft Teams invitation
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-microsoft-teams-invitation-46410ad8
Brand impersonation: Microsoft Planner with suspicious link
6d ago
Feb 6th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-microsoft-planner-with-suspicious-link-ea363c08
Brand impersonation: Fake Fax
7d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-fake-fax-2a96b90a
Credential phishing: Generic document sharing
7d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/credential-phishing-generic-document-sharing-9f0e1d2c
Brand impersonation: DocuSign
7d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-docusign-4d29235c
Brand impersonation: Zoom via lookalike domain
7d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-zoom-via-lookalike-domain-b9d5e4b5