Extortion / sextortion (untrusted sender)
Detects extortion and sextortion attempts by analyzing the email body text from an untrusted sender.
Sublime rule (View on GitHub)
1name: "Extortion / sextortion (untrusted sender)"
2description: |
3 Detects extortion and sextortion attempts by analyzing the email body text from an untrusted sender.
4references:
5 - "https://krebsonsecurity.com/2018/07/sextortion-scam-uses-recipients-hacked-passwords/"
6type: "rule"
7severity: "low"
8source: |
9 type.inbound
10 and length(filter(body.links, .display_text is not null)) < 10
11 and not (
12 ml.nlu_classifier(body.current_thread.text).language == "english"
13 and any(ml.nlu_classifier(body.html.display_text).topics,
14 .name in (
15 "News and Current Events",
16 "Newsletters and Digests",
17 "Advertising and Promotions"
18 )
19 and .confidence in ("high", "medium")
20 )
21 )
22 and (
23 (
24 any(ml.nlu_classifier(strings.replace_confusables(body.current_thread.text)).intents,
25 (.name == "extortion" and .confidence == "high")
26 )
27 and (
28 any(ml.nlu_classifier(strings.replace_confusables(body.current_thread.text
29 )
30 ).entities,
31 .name == "financial"
32 or (
33 .name is not null
34 and regex.icontains(.text,
35 "cybḛ[rŗřṙȑȓɍʀɼɽг]c[rŗřṙȑȓɍʀɼɽг]imina[lĺļľḷḹḽłƖʟḻ]s"
36 )
37 )
38 )
39 or any(ml.nlu_classifier(strings.replace_confusables(body.current_thread.text
40 )
41 ).topics,
42 .name == "Financial Communications" and .confidence != "low"
43 )
44 )
45 )
46 // manual indicators failsafe
47 or 3 of (
48 // malware terms
49 regex.icontains(strings.replace_confusables(body.current_thread.text),
50 "(?:(?:spy|[mṁ][aȁ]l)[wŵ][aȁ][rŗ]e|[tŢ][rŗȓ][oố]j[aǻ][nņ]|[rȓ]emote (?:entry|cont[rř]o[lĺ])|infiltrat(?:ed|ion)|backdoor|vi[rṙ]us|intruder|(?:your|the).{0,15}(?:device|system|computer|phone).{0,10}(?:became|was|got|is).{0,5}comprom[ḯiïíįī]sed|prov[ḯiïíįī]d[ḯiïíįī]ng.{0,20}full [aảǡą]ccess)"
51 ),
52 // actions recorded
53 regex.icontains(strings.replace_confusables(body.current_thread.text),
54 "(?:p[oộ][rŗ]n|a[dȡ]ult (?:web)?site|webcam|mastu[rŗ]bating|je[rŗ]king off|pleasu[rŗȑ]i[nŋ]g you[rŗṛ]self|getting off|expli[cƈ]it|cl[ḯiïíįī]ps.{0,20}screenshots)"
55 ),
56 regex.icontains(strings.replace_confusables(body.current_thread.text),
57 "(?:pe[rŗ]ve[rŗ]t|pe[rŗ]ve[rŗ]sion|mastu[rŗ]bat)"
58 ),
59 // a timeframe to pay
60 regex.icontains(strings.replace_confusables(body.current_thread.text),
61 '[ilo0-9]{2} (?:hou[rŗṝ][sṣ]|uu[rŗ])',
62 '(?:one|tw[oờ]|2|th[rŗ]ee|\d) [dḍ][aảǡą]y[sṣ]?',
63 'set a timer'
64 ),
65 // a promise from the actor
66 regex.icontains(strings.replace_confusables(body.current_thread.text),
67 '(?:pe[rŗ]manently|will|I''ll) delete|([rŗ]emove|destroy) (?:[\p{L}\p{M}\p{N}]+\s*){0,4} (?:data|ev[ḯiïįīí]dence|v[ḯiïíįī]deos?)'
68 ),
69 // a threat from the actor
70 regex.icontains(strings.replace_confusables(body.current_thread.text),
71 '(?:\bsen[dt]|forward|expose)\s*(?:[\p{L}\p{N}]+\s*){0,5}\s*to\s*(?:[\p{L}\p{N}]+\s*){0,5}(?:contacts|media|family|f[rŗ]iends|coworkers|associates)'
72 ),
73 // bitcoin language (excluding newsletters)
74 (
75 regex.icontains(strings.replace_confusables(body.current_thread.text),
76 '[bḆḂ]it[cĉƈ][oöة]i[nņɲ]|\bbtc\b|blockchain'
77 )
78 // negate cryptocurrency newsletters
79 and not (
80 any(body.links,
81 strings.icontains(.display_text, "unsubscribe")
82 and (
83 strings.icontains(.href_url.path, "unsubscribe")
84 // handle mimecast URL rewrites
85 or (
86 .href_url.domain.root_domain == 'mimecastprotect.com'
87 and strings.icontains(.href_url.query_params,
88 sender.email.domain.root_domain
89 )
90 )
91 )
92 )
93 )
94 ),
95 (
96 regex.icontains(strings.replace_confusables(body.current_thread.text),
97 '(?:contact the police|(?:bitcoin|\bbtc\b).{0,20}wallet)'
98 )
99 and regex.icontains(strings.replace_confusables(body.current_thread.text),
100 '(?:\b[13][a-km-zA-HJ-NP-Z0-9]{24,34}\b)|\bX[1-9A-HJ-NP-Za-km-z]{33}\b|\b(?:0x[a-fA-F0-9]{40})\b|\b[LM3][a-km-zA-HJ-NP-Z1-9]{26,33}\b|\b[48][0-9AB][1-9A-HJ-NP-Za-km-z]{93}\b'
101 )
102 ),
103 regex.icontains(strings.replace_confusables(body.current_thread.text),
104 'bc1q.{0,50}\b'
105 )
106 )
107 )
108 and (
109 not profile.by_sender().solicited
110 or (
111 profile.by_sender().any_messages_malicious_or_spam
112 and not profile.by_sender().any_messages_benign
113 )
114 or any(headers.hops, any(.fields, .name == "X-Google-Group-Id"))
115
116 // many extortion emails spoof sender domains and fail sender authentication
117 or (
118 not headers.auth_summary.dmarc.pass
119 or headers.auth_summary.dmarc.pass is null
120 or not headers.auth_summary.spf.pass
121 )
122 )
123 // negate legit bounce backs
124 and not any(ml.nlu_classifier(body.current_thread.text).topics,
125 .name in ("Bounce Back and Delivery Failure Notifications")
126 )
127 // negate legit forwards and replies
128 and not (
129 (subject.is_reply or subject.is_forward)
130 and length(body.previous_threads) > 0
131 and (length(headers.references) > 0 or headers.in_reply_to is not null)
132 )
133 // negate benign newsletters that mention cyber extortion
134 and not (
135 any(body.links,
136 strings.icontains(.display_text, "unsubscribe")
137 and strings.icontains(.href_url.path, "unsubscribe")
138 )
139 // newsletters are typically longer than the average extortion script
140 and length(body.current_thread.text) > 2000
141 )
142 and length(body.current_thread.text) < 8000
143 // negate TOS collisions from legal phrasing
144 and not strings.icontains(body.current_thread.text, "terms of service")
145 // negate highly trusted sender domains unless they fail DMARC authentication
146 and (
147 (
148 sender.email.domain.root_domain in $high_trust_sender_root_domains
149 and not headers.auth_summary.dmarc.pass
150 )
151 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
152 )
153
154attack_types:
155 - "Extortion"
156tactics_and_techniques:
157 - "Social engineering"
158 - "Spoofing"
159detection_methods:
160 - "Content analysis"
161 - "Header analysis"
162 - "Natural Language Understanding"
163 - "Sender analysis"
164id: "265913eb-2ccd-5f77-9a09-f6d8539fd2f6"