Attachment: Callback Phishing solicitation via image file

A fraudulent invoice/receipt found in an image attachment. Callback Phishing is an attempt by an attacker to solicit the victim (recipient) to call a phone number. The resulting interaction could lead to a multitude of attacks ranging from Financial theft, Remote Access Trojan (RAT) Installation or Ransomware Deployment.

Sublime rule (View on GitHub)

 1name: "Attachment: Callback Phishing solicitation via image file"
 2description: |
 3  A fraudulent invoice/receipt found in an image attachment.
 4  Callback Phishing is an attempt by an attacker to solicit the victim (recipient) to call a phone number. 
 5  The resulting interaction could lead to a multitude of attacks ranging from Financial theft, Remote Access Trojan (RAT) Installation or Ransomware Deployment.  
 6type: "rule"
 7authors:
 8  - twitter: "vector_sec"
 9severity: "high"
10source: |
11  type.inbound
12  and (
13    not profile.by_sender().solicited
14    or (
15      profile.by_sender().any_messages_malicious_or_spam
16      and not profile.by_sender().any_false_positives
17    )
18  )
19  and (
20    sender.email.domain.root_domain in $free_email_providers
21    or sender.email.domain.root_domain in ("onmicrosoft.com")
22    or (
23      (
24        length(recipients.to) == 0
25        or all(recipients.to, .display_name == "Undisclosed recipients")
26      )
27      and length(recipients.cc) == 0
28      and length(recipients.bcc) == 0
29    )
30  )
31  and any(attachments,
32          // exclude images taken with mobile cameras and screenshots from android
33          .file_type in $file_types_images
34          and any(file.explode(.),
35                  not any(.scan.exiftool.fields,
36                          .key == "Model"
37                          or (
38                            .key == "Software"
39                            and strings.starts_with(.value, "Android")
40                          )
41                  )
42                  // exclude images taken with mobile cameras and screenshots from Apple
43                  and not any(.scan.exiftool.fields,
44                              .key == "DeviceManufacturer"
45                              and .value == "Apple Computer Inc."
46                  )
47                  and not any(.scan.exiftool.fields,
48                              .key == "UserComment" and .value == "Screenshot"
49                  )
50                  and 4 of (
51                    strings.icontains(.scan.ocr.raw, "purchase"),
52                    strings.icontains(.scan.ocr.raw, "subscription"),
53                    strings.icontains(.scan.ocr.raw, "antivirus"),
54                    strings.icontains(.scan.ocr.raw, "order"),
55                    strings.icontains(.scan.ocr.raw, "support"),
56                    strings.icontains(.scan.ocr.raw, "receipt"),
57                    strings.icontains(.scan.ocr.raw, "amount"),
58                    strings.icontains(.scan.ocr.raw, "charged"),
59                    strings.icontains(.scan.ocr.raw, "invoice"),
60                    strings.icontains(.scan.ocr.raw, "call"),
61                    strings.icontains(.scan.ocr.raw, "cancel"),
62                    strings.icontains(.scan.ocr.raw, "renew"),
63                    strings.icontains(.scan.ocr.raw, "refund"),
64                    strings.icontains(.scan.ocr.raw, "+1")
65                  )
66          )
67          and any(file.explode(.),
68                  regex.icontains(.scan.ocr.raw,
69                                  'p.{0,3}a.{0,3}y.{0,3}p.{0,3}a.{0,3}l|mcafee|n[o0]rt[o0]n|geek.{0,5}squad|ebay|symantec|best buy|lifel[o0]c|secure anywhere'
70                  )
71          )
72  )  
73attack_types:
74  - "Callback Phishing"
75tactics_and_techniques:
76  - "Evasion"
77  - "Free email provider"
78  - "Out of band pivot"
79  - "Social engineering"
80  - "Image as content"
81detection_methods:
82  - "Content analysis"
83  - "Optical Character Recognition"
84  - "Sender analysis"
85  - "URL analysis"
86  - "Computer Vision"
87id: "60acbb36-8ed1-562e-8027-260c2fdf0f04"
to-top