Detection Method: Header analysis

Header analysis inspects the metadata in message headers to find suspicious patterns, anomalies, or inconsistencies that could indicate phishing, spoofing, or other types of malicious activity. It looks at various header fields like routing information, authentication results, and sender verification data to help spot potential threats.
This includes sender authentication headers like SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance) results to verify the sender's legitimacy. It also checks how the email traveled through mail servers, looking for any unusual routing that might suggest tampering.
Header analysis can detect:
  • Email spoofing, where attackers forge the sender’s address to appear legitimate
  • Mismatched or inconsistent sender details
  • Suspicious return paths that don’t match the expected sender
  • Unusual routing patterns that stand out from normal email flow
  • Authentication failures that signal potential impersonation attempts
For example, attackers might try to forge email headers to make phishing emails appear as if they’re coming from a trusted source like your bank or your company’s internal email. Header analysis helps you catch these attempts by identifying mismatches between the displayed sender and the actual sending server.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Brand impersonation: Google Careers
2h ago
Nov 12th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-google-careers-cf2d97ad
VIP Impersonation via Google Group relay with suspicious indicators
3h ago
Nov 12th, 2025
Sublime Security
/feeds/core/detection-rules/vip-impersonation-via-google-group-relay-with-suspicious-indicators-57f9cd3b
Fake message thread with a suspicious link and engaging language from an unknown sender
3h ago
Nov 12th, 2025
Sublime Security
/feeds/core/detection-rules/fake-message-thread-with-a-suspicious-link-and-engaging-language-from-an-unknown-sender-8fd0e211
VIP impersonation with charitable donation fraud
3h ago
Nov 12th, 2025
Sublime Security
/feeds/core/detection-rules/vip-impersonation-with-charitable-donation-fraud-35a56b8e
Service Abuse: ExactTarget with suspicious sender indicators
4d ago
Nov 8th, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-exacttarget-with-suspicious-sender-indicators-6154f197
Brand impersonation: Survey request with credential theft indicators
4d ago
Nov 8th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-survey-request-with-credential-theft-indicators-ea1c0e09
Brand impersonation: Microsoft with low reputation links
4d ago
Nov 8th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6
Credential phishing: Suspicious e-sign agreement document notification
5d ago
Nov 7th, 2025
Sublime Security
/feeds/core/detection-rules/credential-phishing-suspicious-e-sign-agreement-document-notification-9b68c2d8
Brand impersonation: SharePoint PDF attachment with credential theft language
5d ago
Nov 7th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-sharepoint-pdf-attachment-with-credential-theft-language-ae3756fa
Brand impersonation: SendGrid
5d ago
Nov 7th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-sendgrid-d800124f
Brand impersonation: Paperless Post
6d ago
Nov 6th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-paperless-post-e9ec5e09
Headers: Outlook Express mailer
6d ago
Nov 6th, 2025
Sublime Security
/feeds/core/detection-rules/headers-outlook-express-mailer-b7a698de
Spam: Mastercard promotional content with image-based body
7d ago
Nov 5th, 2025
Sublime Security
/feeds/core/detection-rules/spam-mastercard-promotional-content-with-image-based-body-5f2cb559
Brand impersonation: Coinbase
8d ago
Nov 4th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-coinbase-3dca757a
Brand impersonation: Amazon
8d ago
Nov 4th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-amazon-13fc967d
Attachment: EML file contains HTML attachment with login portal indicators
8d ago
Nov 4th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-eml-file-contains-html-attachment-with-login-portal-indicators-6e4df158
ClickFunnels link infrastructure abuse
8d ago
Nov 4th, 2025
Sublime Security
/feeds/core/detection-rules/clickfunnels-link-infrastructure-abuse-9192fbe9
Attachment: RFC822 containing suspicious file sharing language with links from untrusted sender
8d ago
Nov 4th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-rfc822-containing-suspicious-file-sharing-language-with-links-from-untrusted-sender-d96854d7
Impersonation: Internal corporate services
8d ago
Nov 4th, 2025
Sublime Security
/feeds/core/detection-rules/impersonation-internal-corporate-services-3cd04f33
Spam: Personalized subject and greetings via Salesforce Marketing Cloud
9d ago
Nov 3rd, 2025
Sublime Security
/feeds/core/detection-rules/spam-personalized-subject-and-greetings-via-salesforce-marketing-cloud-c77f127f