Tactic or Technique: Social engineering

Social engineering targets people instead of systems. Attackers use persuasion, pressure, or emotional cues to get you to act quickly and bypass security tools without realizing it.
Messages often create urgency, mimic authority figures, or feel familiar enough to lower your guard. An attacker might pose as your manager asking for a quick favor, reference a recent company event, or claim your account is about to be locked. These tricks are designed to feel legitimate and get you to respond without verifying the request.
Common approaches include pretexting, where attackers invent a believable scenario; baiting, where they offer something enticing; or quid pro quo, where they offer help in exchange for access. Even a single successful interaction can lead to broader compromise, including data theft, ransomware, or a full network breach.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Brand impersonation: Google Drive fake file share
6h ago
Dec 4th, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-google-drive-fake-file-share-b424a941
Service abuse: Sendgrid credential theft with personalized request targeting single recipient
7h ago
Dec 4th, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-sendgrid-credential-theft-with-personalized-request-targeting-single-recipient-b9680da1
Fake voicemail notification (untrusted sender)
11h ago
Dec 4th, 2025
Sublime Security
/feeds/core/detection-rules/fake-voicemail-notification-untrusted-sender-74ba7787
Attachment: PDF with personal Microsoft OneNote URL
11h ago
Dec 4th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-pdf-with-personal-microsoft-onenote-url-0675bbc5
Fraudulent order confirmation/shipping notification from Chinese sender domain
2d ago
Dec 3rd, 2025
Sublime Security
/feeds/core/detection-rules/fraudulent-order-confirmationshipping-notification-from-chinese-sender-domain-4392a14e
Link: HR impersonation with suspicious domain indicators and credential theft
2d ago
Dec 3rd, 2025
Sublime Security
/feeds/core/detection-rules/link-hr-impersonation-with-suspicious-domain-indicators-and-credential-theft-f31f8831
Spam: Fake dating profile notification
2d ago
Dec 3rd, 2025
Sublime Security
/feeds/core/detection-rules/spam-fake-dating-profile-notification-0f33fea2
Service abuse: Roomsy with unrelated body content
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-roomsy-with-unrelated-body-content-18e08a5a
Service abuse: Suspicious Zoom Docs link
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/service-abuse-suspicious-zoom-docs-link-064b2594
Spam: Firebase password reset from suspicious sender
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/spam-firebase-password-reset-from-suspicious-sender-a2f673a9
Link: URL scheme obfuscation via split HTML anchors
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/link-url-scheme-obfuscation-via-split-html-anchors-10375948
Brand impersonation: Google Workspace alert notification
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-google-workspace-alert-notification-143ffbc4
Brand impersonation: Purdue ePlanroom with suspicious links
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-purdue-eplanroom-with-suspicious-links-4db5b0b6
Credential phishing: Generic document sharing
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/credential-phishing-generic-document-sharing-9f0e1d2c
Brand impersonation: United Healthcare
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-united-healthcare-f8dfff1a
Reconnaissance: Short generic greeting message
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/reconnaissance-short-generic-greeting-message-c67dedab
Suspicious invoice reference with missing or image-only attachments
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/suspicious-invoice-reference-with-missing-or-image-only-attachments-466c1680
Link abuse: Self-service creation platform link with suspicious recipient behavior
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/link-abuse-self-service-creation-platform-link-with-suspicious-recipient-behavior-384ad135
Impersonation: Social Security Administration (SSA)
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/impersonation-social-security-administration-ssa-6196767e
Brand impersonation: Sharepoint fake file share
3d ago
Dec 2nd, 2025
Sublime Security
/feeds/core/detection-rules/brand-impersonation-sharepoint-fake-file-share-ff8b296b