Brand impersonation: GoDaddy
Detects messages where the sender is impersonating GoDaddy through display name manipulation or lookalike domains, while not being legitimately authenticated from GoDaddy's infrastructure.
Sublime rule (View on GitHub)
1name: "Brand impersonation: GoDaddy"
2description: "Detects messages where the sender is impersonating GoDaddy through display name manipulation or lookalike domains, while not being legitimately authenticated from GoDaddy's infrastructure."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and (
8 regex.icontains(sender.display_name, 'godaddy')
9 or strings.ilike(sender.display_name, "*godaddy*")
10 or strings.ilevenshtein(sender.display_name, 'godaddy') <= 1
11 or strings.ilike(sender.email.domain.domain, '*godaddy*')
12 )
13 and not (
14 sender.email.domain.root_domain in ("godaddy.com", "registry.godaddy")
15 and headers.auth_summary.dmarc.pass
16 )
17 and not profile.by_sender().solicited
18 // negate highly trusted sender domains unless they fail DMARC authentication
19 and (
20 (
21 sender.email.domain.root_domain in $high_trust_sender_root_domains
22 and not headers.auth_summary.dmarc.pass
23 )
24 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
25 )
26
27attack_types:
28 - "Credential Phishing"
29tactics_and_techniques:
30 - "Impersonation: Brand"
31 - "Social engineering"
32detection_methods:
33 - "Header analysis"
34 - "Sender analysis"
35id: "4130d555-40fc-5b12-bbf0-60cf5e93c15f"