Detection Method: Header analysis

Header analysis inspects the metadata in message headers to find suspicious patterns, anomalies, or inconsistencies that could indicate phishing, spoofing, or other types of malicious activity. It looks at various header fields like routing information, authentication results, and sender verification data to help spot potential threats.
This includes sender authentication headers like SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance) results to verify the sender's legitimacy. It also checks how the email traveled through mail servers, looking for any unusual routing that might suggest tampering.
Header analysis can detect:
  • Email spoofing, where attackers forge the sender’s address to appear legitimate
  • Mismatched or inconsistent sender details
  • Suspicious return paths that don’t match the expected sender
  • Unusual routing patterns that stand out from normal email flow
  • Authentication failures that signal potential impersonation attempts
For example, attackers might try to forge email headers to make phishing emails appear as if they’re coming from a trusted source like your bank or your company’s internal email. Header analysis helps you catch these attempts by identifying mismatches between the displayed sender and the actual sending server.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Brand impersonation: FedEx
2d ago
May 8th, 2026
Sublime Security
Brand impersonation: Quickbooks
2d ago
May 8th, 2026
Sublime Security
Observed IOC: Malicious sender email addresses
3d ago
May 7th, 2026
Sublime Security
Observed IOC: Malicious sender domains
3d ago
May 7th, 2026
Sublime Security
Brand Impersonation: PayPal
3d ago
May 7th, 2026
Sublime Security
Brand impersonation: Booking.com
4d ago
May 6th, 2026
Sublime Security
Callback phishing via calendar invite
4d ago
May 6th, 2026
Sublime Security
Suspicious newly registered reply-to domain with engaging financial or urgent language
4d ago
May 6th, 2026
Sublime Security
Service Abuse: Zoom with freemail reply-to and recipient address in greeting
4d ago
May 6th, 2026
Sublime Security
Link: Romance/Sexual Language With Suspicious Link
5d ago
May 5th, 2026
Sublime Security
Service abuse: Zoom with newly registered reply-to domain
6d ago
May 4th, 2026
Sublime Security
Extortion / sextortion (untrusted sender)
6d ago
May 4th, 2026
Sublime Security
Callback phishing: SumUp infrastructure abuse
6d ago
May 4th, 2026
Sublime Security
Callback phishing via Intuit service abuse
6d ago
May 4th, 2026
Sublime Security
Impersonation: Suspected supplier impersonation with suspicious content
6d ago
May 4th, 2026
Sublime Security
Observed IOC: Malicious sender root domains
6d ago
May 4th, 2026
Sublime Security
Callback phishing via Adobe Sign comment
6d ago
May 4th, 2026
Sublime Security
PayPal invoice abuse
6d ago
May 4th, 2026
Sublime Security
Brand impersonation: Trust Wallet
6d ago
May 4th, 2026
Sublime Security
Callback phishing: AOL senders with suspicious HTML template or PDF attachment
6d ago
May 4th, 2026
Sublime Security