Attack Type: Credential Phishing

Credential phishing attacks are designed to steal your login information by tricking you into entering it on fake login pages. These emails impersonate trusted services like Microsoft 365, Google Workspace, or banking sites, using urgent phrases like “verify your account,” “prevent suspension,” or “view shared document” to push you into clicking.
Once you click the link, it leads to a fake login page that looks convincing. If you enter your credentials, the attacker captures them immediately. Common examples include phishing emails pretending to be DocuSign requests, Dropbox links, or HR file shares—things that feel routine but create a false sense of urgency.
Attackers often use real platforms like Microsoft Forms, Google Forms, or compromised websites to host these fake login pages, making the links appear legitimate and harder for security tools to catch. The damage doesn’t stop at just stealing your login. Once attackers gain access, they can move through your organization, steal sensitive data, send internal phishing emails, or even launch a ransomware attack.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Link: GoPhish default rid value
49m ago
Nov 12th, 2025
Sublime Security
/feeds/core/detection-rules/link-gophish-default-rid-value-6d2b9c8a
Brand impersonation: Google Careers
2h ago
Nov 12th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-google-careers-cf2d97ad
Link to a domain with punycode characters
2h ago
Nov 12th, 2025
@ajpc500
/feeds/core/detection-rules/link-to-a-domain-with-punycode-characters-74b3698c
VIP Impersonation via Google Group relay with suspicious indicators
3h ago
Nov 12th, 2025
Sublime Security
/feeds/core/detection-rules/vip-impersonation-via-google-group-relay-with-suspicious-indicators-57f9cd3b
Fake message thread with a suspicious link and engaging language from an unknown sender
3h ago
Nov 12th, 2025
Sublime Security
/feeds/core/detection-rules/fake-message-thread-with-a-suspicious-link-and-engaging-language-from-an-unknown-sender-8fd0e211
Attachment: PDF with Microsoft Purview message impersonation
2d ago
Nov 10th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-pdf-with-microsoft-purview-message-impersonation-571d4964
Service Abuse: ExactTarget with suspicious sender indicators
4d ago
Nov 8th, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-exacttarget-with-suspicious-sender-indicators-6154f197
Attachment: Encrypted PDF with credential theft body
4d ago
Nov 8th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-encrypted-pdf-with-credential-theft-body-c9596c9a
Brand impersonation: Survey request with credential theft indicators
4d ago
Nov 8th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-survey-request-with-credential-theft-indicators-ea1c0e09
Brand impersonation: Microsoft with low reputation links
4d ago
Nov 8th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6
Credential phishing: Suspicious e-sign agreement document notification
5d ago
Nov 7th, 2025
Sublime Security
/feeds/core/detection-rules/credential-phishing-suspicious-e-sign-agreement-document-notification-9b68c2d8
Brand impersonation: SharePoint PDF attachment with credential theft language
5d ago
Nov 7th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-sharepoint-pdf-attachment-with-credential-theft-language-ae3756fa
Brand impersonation: SendGrid
5d ago
Nov 7th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-sendgrid-d800124f
Brand impersonation: Paperless Post
6d ago
Nov 6th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-paperless-post-e9ec5e09
Headers: Outlook Express mailer
6d ago
Nov 6th, 2025
Sublime Security
/feeds/core/detection-rules/headers-outlook-express-mailer-b7a698de
Service Abuse: Nifty.com with impersonation
7d ago
Nov 5th, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-niftycom-with-impersonation-370cfdac
Compensation review with QR code in attached EML
7d ago
Nov 5th, 2025
Sublime Security
/feeds/core/detection-rules/compensation-review-with-qr-code-in-attached-eml-98a2f03c
Credential phishing: Fake storage alerts (unsolicited)
7d ago
Nov 5th, 2025
Sublime Security
/feeds/core/detection-rules/credential-phishing-fake-storage-alerts-unsolicited-750f04d6
Brand impersonation: USPS
7d ago
Nov 5th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-usps-28b9130a
Spam: Mastercard promotional content with image-based body
7d ago
Nov 5th, 2025
Sublime Security
/feeds/core/detection-rules/spam-mastercard-promotional-content-with-image-based-body-5f2cb559