Detection Method: Sender analysis

Sender analysis helps you assess whether an email is coming from a legitimate sender. By combining machine learning and rules-based logic, this method evaluates sender profiles, looking at things like authentication results, past behavior, and patterns from previous messages.
Sender analysis can help you detect:
  • Impersonation attempts using fake email addresses or domains
  • Suspicious senders with authentication issues (e.g., SPF, DKIM, DMARC failures)
  • Unusual behavior based on historical patterns, like frequent urgent requests
  • Senders linked to known phishing or malware campaigns
  • Changes in sender behavior that could indicate a compromised account
For example, an attacker might try to impersonate a trusted vendor or executive. The email address or domain might look real, but sender analysis can catch issues like failed authentication checks or past suspicious activity, helping you spot these threats before they do damage.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Brand impersonation: DocuSign
3d ago
Apr 17th, 2026
Sublime Security
BEC/Fraud: Urgent language and suspicious sending/infrastructure patterns
3d ago
Apr 17th, 2026
Sublime Security
Self-sender with copy/paste instructions and suspicious domains (French/Français)
4d ago
Apr 16th, 2026
Sublime Security
Brand impersonation: Wells Fargo
5d ago
Apr 15th, 2026
Sublime Security
Service abuse: Meetup.com redirect with brand impersonation
5d ago
Apr 15th, 2026
Sublime Security
Credential phishing: 'Secure message' and engaging language
5d ago
Apr 15th, 2026
Sublime Security
Brand impersonation: Amazon with suspicious attachment
6d ago
Apr 14th, 2026
Sublime Security
Advance Fee Fraud (AFF) from freemail provider or suspicious TLD
6d ago
Apr 14th, 2026
Sublime Security
Spam: Website errors solicitation
6d ago
Apr 14th, 2026
Sublime Security
Attachment: Compensation review lure with QR code
6d ago
Apr 14th, 2026
Sublime Security
Brand impersonation: USPS
7d ago
Apr 13th, 2026
Sublime Security
Callback phishing via Microsoft comment
7d ago
Apr 13th, 2026
Sublime Security
Cloud storage impersonation with credential theft indicators
11d ago
Apr 9th, 2026
Sublime Security
Brand impersonation: McAfee
11d ago
Apr 9th, 2026
Sublime Security
Attachment: Encrypted PDF with credential theft body
11d ago
Apr 9th, 2026
Sublime Security
Callback phishing via Apple ID display name abuse
12d ago
Apr 8th, 2026
Sublime Security
Service abuse: GitHub notification with excessive mentions and suspicious links
13d ago
Apr 7th, 2026
Sublime Security
Link: Job recruitment lure from unsolicited sender with suspicious hosting
13d ago
Apr 7th, 2026
Sublime Security
Brand impersonation: Zoom via lookalike domain
13d ago
Apr 7th, 2026
Sublime Security
QR Code with suspicious indicators
14d ago
Apr 6th, 2026
Sublime Security