Brand impersonation: Zoom via lookalike domain

Message contains a single link which attempts to spoof a 'zoom' link, sent from a free email provider to a single recipient.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Zoom via lookalike domain"
 2description: "Message contains a single link which attempts to spoof a 'zoom' link, sent from a free email provider to a single recipient."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  and any(body.current_thread.links,
 8          not (
 9            .href_url.domain.root_domain in (
10              "zoom.us",
11              "zoom.com",
12              "zoominternet.net",
13              "profitzoom.net",
14              "zoomtown.com"
15            )
16            or (
17              .display_url.domain.root_domain is not null
18              and .display_url.domain.root_domain in (
19                "zoom.us",
20                "zoom.com",
21                "zoominternet.net",
22                "profitzoom.net",
23                "zoomtown.com"
24              )
25            )
26          )
27  
28          // zoom in the subdomain or sld
29          and (
30            strings.contains(.href_url.domain.sld, "zoom")
31            or strings.contains(.href_url.domain.subdomain, "zoom")
32            or strings.contains(.display_url.domain.sld, "zoom")
33            or strings.contains(.display_url.domain.subdomain, "zoom")
34          )
35  )
36  and length(distinct(body.current_thread.links, .href_url.url)) == 1
37  and sender.email.domain.root_domain in $free_email_providers
38  and length(recipients.to) == 1
39  and not subject.is_forward  
40attack_types:
41  - "Credential Phishing"
42tactics_and_techniques:
43  - "Impersonation: Brand"
44  - "Free email provider"
45  - "Social engineering"
46detection_methods:
47  - "URL analysis"
48  - "Sender analysis"
49id: "b9d5e4b5-7137-5ac5-b5cc-0ec5323fd31c"
to-top