Brand Impersonation: WeTransfer
Detects messages claiming to be from WeTransfer that contain suspicious indicators, including misspelled domains, non-standard TLDs, suspicious file reference numbers, and French language variations. Excludes legitimate WeTransfer traffic with valid DMARC authentication.
Sublime rule (View on GitHub)
1name: "Brand Impersonation: WeTransfer"
2description: "Detects messages claiming to be from WeTransfer that contain suspicious indicators, including misspelled domains, non-standard TLDs, suspicious file reference numbers, and French language variations. Excludes legitimate WeTransfer traffic with valid DMARC authentication."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and 2 of (
8 (
9 strings.ilike(sender.display_name, '*wetransfer*')
10 or strings.ilike(sender.display_name, '*we transfer*')
11 or strings.ilevenshtein(sender.display_name, "wetransfer") <= 1
12 ),
13
14 // Check for misspelled wetransfer domains in sender email
15 regex.icontains(sender.email.email, 'nore?pl[a@]y@wetransfer'),
16
17 // Check for non-legitimate TLDs (.fr or others)
18 regex.icontains(sender.email.domain.root_domain, 'wetransfer\\.[a-z]{2,4}$'),
19
20 // Suspicious subject patterns
21 regex.icontains(subject.subject,
22 '(?:Documents?|Files?) (?:Received|Sent) (?:via)? WeTransfer'
23 ),
24
25 // Check for file reference numbers which are common in phishing
26 regex.icontains(subject.subject,
27 'WeTransfer \[(?:File No\.|)\s*:\s*[0-9-]+\s*\]'
28 ),
29
30 // French language patterns
31 regex.icontains(subject.subject, 'vous a envoy[ée] .{1,30} par WeTransfer'),
32 regex.icontains(subject.subject, "T[ÉE]L[ÉE]CHARGEZ VOTRE FICHIER"),
33 regex.icontains(body.current_thread.text, 'transfert expirera'),
34 regex.icontains(body.current_thread.text,
35 "fichiers n'aient pas encore été téléchargés"
36 ),
37 any(body.links,
38 strings.ilike(.display_text, '*wetransfer*')
39 and .href_url.domain.root_domain not in~ ('wetransfer.com', 'we.tl')
40 ),
41 any(body.links,
42 (
43 .href_url.domain.root_domain in $free_file_hosts
44 and .href_url.domain.root_domain not in~ ('wetransfer.com', 'we.tl')
45 )
46 or network.whois(.href_url.domain).days_old < 30
47 or .href_url.domain.tld in $suspicious_tlds
48 )
49 )
50 and not (
51 sender.email.domain.root_domain in ("wetransfer.com", "we.tl")
52 and headers.auth_summary.dmarc.pass
53 )
54 // negate highly trusted sender domains unless they fail DMARC authentication
55 and (
56 (
57 sender.email.domain.root_domain in $high_trust_sender_root_domains
58 and not headers.auth_summary.dmarc.pass
59 )
60 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
61 )
62 and (
63 not profile.by_sender().solicited
64 or (
65 profile.by_sender().any_messages_malicious_or_spam
66 and not profile.by_sender().any_false_positives
67 )
68 )
69 and not profile.by_sender().any_false_positives
70
71attack_types:
72 - "BEC/Fraud"
73 - "Callback Phishing"
74 - "Credential Phishing"
75 - "Extortion"
76 - "Malware/Ransomware"
77 - "Spam"
78tactics_and_techniques:
79 - "Impersonation: Brand"
80detection_methods:
81 - "Content analysis"
82 - "Header analysis"
83 - "Sender analysis"
84id: "e37885ad-1099-58f9-a428-0910c666d119"