heroui logo

Credential phishing: Financial lure via ActiveCampaign infrastructure

Sublime Rules

View Source
Summary
Detects inbound credential phishing emails that use ActiveCampaign infrastructure by fingerprinting the sending service (headers.mailer contains ActiveCampaign) and by identifying financial-lure content in thread text and HTML. The rule flags messages that mention finance-related prompts (e.g., credit cards, loans, deposits, account verification) and include boilerplate phrases or phrases indicating association with third-party services (e.g., Piratini, 45.405.898/0001-16, Cancelar inscri, Matemática Genial) as well as HTML structures such as CTA buttons or styled links (e.g., anchors with es-button class or background/padding styling). It requires the NLU Financial Communications topic classification to scope detection to legitimate financial discourse. The detection enforces English language only and suppresses alerts if non-financial topics (Health and Wellness, Entertainment and Sports) are detected with high confidence. It also reduces false positives by not flagging messages from high-trust senders if DMARC validation passes. Detection methods include Content analysis, Header analysis, Natural Language Understanding, and Sender analysis. The rule is categorized as Credential Phishing with a Social Engineering tactic and is designed for inspection of inbound email content that uses ActiveCampaign infrastructure for financial-lure phishing attempts.
Categories
  • Web
  • Application
Data Sources
  • Application Log
Created: 2026-03-28