Attack Type: Credential Phishing

Credential phishing attacks are designed to steal your login information by tricking you into entering it on fake login pages. These emails impersonate trusted services like Microsoft 365, Google Workspace, or banking sites, using urgent phrases like “verify your account,” “prevent suspension,” or “view shared document” to push you into clicking.
Once you click the link, it leads to a fake login page that looks convincing. If you enter your credentials, the attacker captures them immediately. Common examples include phishing emails pretending to be DocuSign requests, Dropbox links, or HR file shares—things that feel routine but create a false sense of urgency.
Attackers often use real platforms like Microsoft Forms, Google Forms, or compromised websites to host these fake login pages, making the links appear legitimate and harder for security tools to catch. The damage doesn’t stop at just stealing your login. Once attackers gain access, they can move through your organization, steal sensitive data, send internal phishing emails, or even launch a ransomware attack.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Brand impersonation: FedEx
2d ago
May 8th, 2026
Sublime Security
Attachment: SVG files with evasion elements
2d ago
May 8th, 2026
Sublime Security
Brand impersonation: Quickbooks
2d ago
May 8th, 2026
Sublime Security
Service abuse: Microsoft with suspicious indicators in subject
3d ago
May 7th, 2026
Sublime Security
Attachment: Suspicious PDF created with headless browser
3d ago
May 7th, 2026
Sublime Security
Observed IOC: Malicious domains in body links
3d ago
May 7th, 2026
Sublime Security
Observed IOC: Malicious sender email addresses
3d ago
May 7th, 2026
Sublime Security
Observed IOC: Malicious sender domains
3d ago
May 7th, 2026
Sublime Security
Brand Impersonation: PayPal
3d ago
May 7th, 2026
Sublime Security
Service abuse: Dropbox Paper with copy-paste instructions
3d ago
May 7th, 2026
Sublime Security
Link: Suspicious Loom HTML file path
4d ago
May 6th, 2026
Sublime Security
Brand impersonation: Booking.com
4d ago
May 6th, 2026
Sublime Security
Link: Cloud service with credential theft language
4d ago
May 6th, 2026
Sublime Security
Link: Credential harvesting with excess padding evasion
6d ago
May 4th, 2026
Sublime Security
Brand impersonation: Capital One
6d ago
May 4th, 2026
Sublime Security
Brand impersonation: DocuSign with embedded QR code
6d ago
May 4th, 2026
Sublime Security
Brand impersonation: Trust Wallet
6d ago
May 4th, 2026
Sublime Security
Brand impersonation: Sharepoint
6d ago
May 4th, 2026
Sublime Security
Observed IOC: Malicious sender root domains
6d ago
May 4th, 2026
Sublime Security
Brand impersonation: SharePoint PDF attachment with credential theft language
6d ago
May 4th, 2026
Sublime Security