Attachment: DocuSign Impersonation (PDF) linking to New Domain <=3d
This rule detects PDF files containing a DocuSign logo linking to a newly created domain (Less than or equal to 3 days)
Sublime rule (View on GitHub)
1name: "Attachment: DocuSign Impersonation (PDF) linking to New Domain <=3d"
2description: "This rule detects PDF files containing a DocuSign logo linking to a newly created domain (Less than or equal to 3 days)"
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and any(attachments,
8 .file_type == "pdf"
9 and any(ml.logo_detect(.).brands, .name == "DocuSign")
10 and any(file.explode(.), any(.scan.pdf.urls, network.whois(.domain).days_old <= 3))
11 )
12
13 // negate highly trusted sender domains unless they fail DMARC authentication
14 and (
15 (
16 sender.email.domain.root_domain in $high_trust_sender_root_domains
17 and not headers.auth_summary.dmarc.pass
18 )
19 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
20 )
21
22 // excludes senders that contain "via" in the display name a resilient way
23 and not (
24 any(headers.hops,
25 any(.fields, .name == "X-Api-Host" and strings.ends_with(.value, "docusign.net"))
26 )
27 )
28attack_types:
29 - "Credential Phishing"
30tactics_and_techniques:
31 - "Impersonation: Brand"
32 - "PDF"
33 - "Social engineering"
34detection_methods:
35 - "Header analysis"
36 - "Sender analysis"
37 - "URL analysis"
38 - "File analysis"
39 - "Computer Vision"
40 - "Whois"
41id: "f0c96282-6eb9-5e84-aa9d-a48f66db5a74"