Brand impersonation: DocuSign with embedded QR code
This rule detects unsolicited messages with short bodies containing a DocuSign logo, QR code language and an embedded QR code.
Sublime rule (View on GitHub)
1name: "Brand impersonation: DocuSign with embedded QR code"
2description: "This rule detects unsolicited messages with short bodies containing a DocuSign logo, QR code language and an embedded QR code."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and length(body.current_thread.text) < 1000
8 and length(attachments) == 0
9 and regex.icontains(body.current_thread.text, '\bQ(\.)?R(\.)?\b')
10 and regex.icontains(body.current_thread.text, "scan|mobile|camera")
11 and any(ml.logo_detect(file.message_screenshot()).brands,
12 strings.starts_with(.name, "DocuSign")
13 )
14 //
15 // This rule makes use of a beta feature and is subject to change without notice
16 // using the beta feature in custom rules is not suggested until it has been formally released
17 //
18 and any(beta.scan_qr(file.message_screenshot()).items,
19 .type is not null and regex.contains(.data, '\.')
20 )
21 // negate highly trusted sender domains unless they fail DMARC authentication
22 and (
23 (
24 sender.email.domain.root_domain in $high_trust_sender_root_domains
25 and not headers.auth_summary.dmarc.pass
26 )
27 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
28 )
29attack_types:
30 - "Credential Phishing"
31tactics_and_techniques:
32 - "Evasion"
33 - "Image as content"
34 - "Impersonation: Brand"
35 - "QR code"
36detection_methods:
37 - "Computer Vision"
38 - "Content analysis"
39 - "QR code analysis"
40 - "Sender analysis"
41id: "f5cde463-68ed-5dd5-a806-7a835f0b4d7c"