Brand impersonation: Hulu
Impersonation of Hulu.
Sublime rule (View on GitHub)
1name: "Brand impersonation: Hulu"
2description: "Impersonation of Hulu."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and (
8 regex.icontains(sender.display_name, '\bhulu\b')
9 or (
10 strings.ilevenshtein(sender.display_name, 'hulu') <= 1
11 and not (
12 // lulu.com is a self publisher
13 sender.display_name =~ "lulu"
14 and sender.email.domain.root_domain == "lulu.com"
15 )
16 and not (
17 // hudu.com is an IT documentation management platform
18 sender.display_name =~ "hudu"
19 and sender.email.domain.root_domain == "hudu.com"
20 )
21 )
22 or strings.ilike(sender.email.domain.domain, '*hulu*')
23 or (
24 (
25 length(recipients.to) == 0
26 or (
27 all(recipients.to, .email.domain.valid == false)
28 and all(recipients.cc, .email.domain.valid == false)
29 )
30 )
31 and any(ml.logo_detect(file.message_screenshot()).brands,
32 .name == "Hulu" and .confidence in ("medium", "high")
33 )
34 )
35 )
36 and (
37 sender.email.domain.root_domain not in (
38 'hulu.com',
39 'hulumail.com',
40 'hulu.jp',
41 'hulu-japan.jp'
42 )
43 or (
44 sender.email.domain.root_domain in (
45 'hulu.com',
46 'hulumail.com',
47 'hulu.jp',
48 'hulu-japan.jp'
49 )
50 and not headers.auth_summary.dmarc.pass
51 )
52 )
53 and not profile.by_sender().solicited
54attack_types:
55 - "Credential Phishing"
56 - "Spam"
57tactics_and_techniques:
58 - "Free email provider"
59 - "Impersonation: Brand"
60 - "Lookalike domain"
61 - "Social engineering"
62detection_methods:
63 - "Computer Vision"
64 - "Header analysis"
65 - "Sender analysis"
66id: "6833de58-23b6-5dea-b7c9-74e7287d8c13"