Attachment: DocuSign impersonation via PDF linking to new domain
This rule detects PDF files containing a DocuSign logo linking to a newly created domain (Less than or equal to 3 days)
Sublime rule (View on GitHub)
1name: "Attachment: DocuSign impersonation via PDF linking to new domain"
2description: "This rule detects PDF files containing a DocuSign logo linking to a newly created domain (Less than or equal to 3 days)"
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and any(attachments,
8 .file_type == "pdf"
9 and any(ml.logo_detect(.).brands, .name == "DocuSign")
10 and any(file.explode(.),
11 any(.scan.pdf.urls, network.whois(.domain).days_old <= 3)
12 )
13 )
14
15 // negate highly trusted sender domains unless they fail DMARC authentication
16 and (
17 (
18 sender.email.domain.root_domain in $high_trust_sender_root_domains
19 and not headers.auth_summary.dmarc.pass
20 )
21 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
22 )
23
24 // excludes senders that contain "via" in the display name a resilient way
25 and not (
26 any(headers.hops,
27 any(.fields,
28 .name == "X-Api-Host" and strings.ends_with(.value, "docusign.net")
29 )
30 )
31 )
32attack_types:
33 - "Credential Phishing"
34tactics_and_techniques:
35 - "Impersonation: Brand"
36 - "PDF"
37 - "Social engineering"
38detection_methods:
39 - "Header analysis"
40 - "Sender analysis"
41 - "URL analysis"
42 - "File analysis"
43 - "Computer Vision"
44 - "Whois"
45id: "f0c96282-6eb9-5e84-aa9d-a48f66db5a74"