Suspicious DocuSign Share From New Domain

DocuSign shares with new reply-to addresses have been seen in recent attacks.

Sublime rule (View on GitHub)

 1name: "Suspicious DocuSign Share From New Domain"
 2description: "DocuSign shares with new reply-to addresses have been seen in recent attacks."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  
 8  // reply-to email address has never received an email from your org
 9  and not any(headers.reply_to, .email.email in $recipient_emails)
10  
11  // new reply-to
12  and any(headers.reply_to, network.whois(.email.domain).days_old < 30)
13  
14  // message is from docusign actual
15  and sender.email.domain.root_domain == 'docusign.net'
16  and headers.auth_summary.spf.pass
17  and (
18    headers.auth_summary.spf.details.designator == 'docusign.net'
19    // observed subdomains of docusign being used (camail.docusign.net)
20    or strings.ends_with(headers.auth_summary.spf.details.designator,
21                         '.docusign.net'
22    )
23    // "domain of dse_na4@docusign.net"
24    or strings.ends_with(headers.auth_summary.spf.details.designator,
25                         '@docusign.net'
26    )
27  )
28  and headers.auth_summary.dmarc.pass
29  
30  // not a completed DocuSign
31  and not strings.istarts_with(subject.subject, "Completed:")  
32tags:
33 - "Attack surface reduction"
34attack_types:
35  - "BEC/Fraud"
36  - "Credential Phishing"
37tactics_and_techniques:
38  - "Evasion"
39  - "Free file host"
40  - "Impersonation: Brand"
41  - "Social engineering"
42detection_methods:
43  - "Content analysis"
44  - "Header analysis"
45  - "Sender analysis"
46id: "d430a1f3-9a47-59b2-97fc-64b4792d5143"

Related rules

to-top