Brand impersonation: GoDaddy
Detects messages where the sender is impersonating GoDaddy through display name manipulation or lookalike domains, while not being legitimately authenticated from GoDaddy's infrastructure.
Sublime rule (View on GitHub)
1name: "Brand impersonation: GoDaddy"
2description: "Detects messages where the sender is impersonating GoDaddy through display name manipulation or lookalike domains, while not being legitimately authenticated from GoDaddy's infrastructure."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and (
8 regex.icontains(sender.display_name, 'godaddy')
9 or strings.ilike(sender.display_name, "*godaddy*")
10 or strings.ilevenshtein(sender.display_name, 'godaddy') <= 1
11 or strings.ilike(sender.email.domain.domain, '*godaddy*')
12 )
13 and not (
14 sender.email.domain.root_domain in (
15 "godaddy.com",
16 "registry.godaddy",
17 "sucuri.net"
18 )
19 and headers.auth_summary.dmarc.pass
20 )
21 and not profile.by_sender().solicited
22 // negate highly trusted sender domains unless they fail DMARC authentication
23 and (
24 (
25 sender.email.domain.root_domain in $high_trust_sender_root_domains
26 and not headers.auth_summary.dmarc.pass
27 )
28 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
29 )
30
31attack_types:
32 - "Credential Phishing"
33tactics_and_techniques:
34 - "Impersonation: Brand"
35 - "Social engineering"
36detection_methods:
37 - "Header analysis"
38 - "Sender analysis"
39id: "4130d555-40fc-5b12-bbf0-60cf5e93c15f"