Service Abuse: Nifty.com with impersonation
Detects emails from nifty.com where the sender's local part matches a recipient's local part or organizational SLD, which has been observed in credential harvesting campaigns
Sublime rule (View on GitHub)
1name: "Service Abuse: Nifty.com with impersonation"
2description: "Detects emails from nifty.com where the sender's local part matches a recipient's local part or organizational SLD, which has been observed in credential harvesting campaigns"
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and sender.email.domain.root_domain == "nifty.com"
8 and (
9 sender.email.local_part in map(recipients.to, .email.local_part)
10 or sender.email.local_part in $org_slds
11 )
12
13 and ml.nlu_classifier(body.current_thread.text).language != "japanese"
14
15 // and no false positives and not solicited
16 and not profile.by_sender_email().any_messages_benign
17 and not profile.by_sender_email().solicited
18
19attack_types:
20 - "Credential Phishing"
21tactics_and_techniques:
22 - "Spoofing"
23detection_methods:
24 - "Sender analysis"
25id: "370cfdac-4976-59a1-ae1f-7cd5594eb958"