Fraudulent E-commerce Operators
This attacker group engages in fraudulent activity by registering lookalike domains through Namecheap, often mimicking well-known brands by appending terms like LLC, LTD, Inc, or Corp. Their tactics involve sending fraudulent quote requests via Namecheap's private email service, followed by attempts to purchase goods on credit. These goods are routed through freight forwarders, typically bound for Western Africa. With increasing scrutiny on cash transactions to high-risk regions, they have shifted focus to acquiring goods. It is crucial to thoroughly validate any flagged messages and verify credit information before releasing products to these entities.
Sublime rule (View on GitHub)
1name: "Fraudulent E-commerce Operators"
2description: "This attacker group engages in fraudulent activity by registering lookalike domains through Namecheap, often mimicking well-known brands by appending terms like LLC, LTD, Inc, or Corp. Their tactics involve sending fraudulent quote requests via Namecheap's private email service, followed by attempts to purchase goods on credit. These goods are routed through freight forwarders, typically bound for Western Africa. With increasing scrutiny on cash transactions to high-risk regions, they have shifted focus to acquiring goods. It is crucial to thoroughly validate any flagged messages and verify credit information before releasing products to these entities."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and strings.starts_with(headers.mailer, 'Open-Xchange Mailer')
8 and strings.ends_with(headers.message_id, '@privateemail.com>')
9 and regex.imatch(sender.email.domain.sld, '.*(?:llc|ltd|inc|corp|llp|co)')
10 and not sender.email.domain.root_domain == "simpelllc.com"
11
12attack_types:
13 - "BEC/Fraud"
14tactics_and_techniques:
15 - "Impersonation: Brand"
16 - "Lookalike domain"
17 - "Social engineering"
18detection_methods:
19 - "Content analysis"
20 - "Header analysis"
21 - "Sender analysis"
22id: "3776a6fc-73b6-59e3-89c9-317eba43755c"