Attack Type: Credential Phishing

Credential phishing attacks are designed to steal your login information by tricking you into entering it on fake login pages. These emails impersonate trusted services like Microsoft 365, Google Workspace, or banking sites, using urgent phrases like “verify your account,” “prevent suspension,” or “view shared document” to push you into clicking.
Once you click the link, it leads to a fake login page that looks convincing. If you enter your credentials, the attacker captures them immediately. Common examples include phishing emails pretending to be DocuSign requests, Dropbox links, or HR file shares—things that feel routine but create a false sense of urgency.
Attackers often use real platforms like Microsoft Forms, Google Forms, or compromised websites to host these fake login pages, making the links appear legitimate and harder for security tools to catch. The damage doesn’t stop at just stealing your login. Once attackers gain access, they can move through your organization, steal sensitive data, send internal phishing emails, or even launch a ransomware attack.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Credential phishing: 'Secure message' and engaging language
3d ago
Mar 27th, 2026
Sublime Security
Service abuse: Behance document sharing with suspicious language
3d ago
Mar 27th, 2026
Sublime Security
Attachment: PDF bid/proposal lure with credential theft indicators
3d ago
Mar 27th, 2026
Sublime Security
Credential phishing: Financial lure via ActiveCampaign infrastructure
3d ago
Mar 27th, 2026
Sublime Security
Brand impersonation: Robinhood
4d ago
Mar 26th, 2026
Sublime Security
Link: Non-standard port 8443 in display URL
4d ago
Mar 26th, 2026
Sublime Security
Lookalike sender domain (untrusted sender)
5d ago
Mar 25th, 2026
Sublime Security
Brand impersonation: USPS
5d ago
Mar 25th, 2026
Sublime Security
Credential phishing: Fake card notification with tracking lure
6d ago
Mar 24th, 2026
Sublime Security
Link: Financial account issue with suspicious indicators
6d ago
Mar 24th, 2026
Sublime Security
Cloud storage impersonation with credential theft indicators
7d ago
Mar 23rd, 2026
Sublime Security
Credential phishing: Suspicious subject with urgent financial request and link
7d ago
Mar 23rd, 2026
Sublime Security
Brand impersonation: Meta and subsidiaries
10d ago
Mar 20th, 2026
Sublime Security
Brand Impersonation: Procore
10d ago
Mar 20th, 2026
Sublime Security
Link: Free file hosting with undisclosed recipients
11d ago
Mar 19th, 2026
Sublime Security
Service abuse: Substack credential theft with confusable characters and branded button redirects
11d ago
Mar 19th, 2026
Sublime Security
Brand impersonation: DocSend
12d ago
Mar 18th, 2026
Sublime Security
Attachment: PDF contains W9 or invoice YARA signatures
12d ago
Mar 18th, 2026
Sublime Security
Service abuse: Domains By Proxy sender
12d ago
Mar 18th, 2026
Sublime Security
Link: PDF display text with fake copyright claim template
12d ago
Mar 18th, 2026
Sublime Security