Fake request for tax preparation
Unknown sender requesting assistance with tax preparation. This is associated with known threat actor activity, TA576.
Sublime rule (View on GitHub)
1name: "Fake request for tax preparation"
2description: "Unknown sender requesting assistance with tax preparation. This is associated with known threat actor activity, TA576."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and length(body.current_thread.text) < 1250
8 and any(beta.ml_topic(body.current_thread.text).topics,
9 .name == "Financial Communications"
10 )
11 // there are no links, all the links are to aka.ms, or an extraction from a warning banner that match the senders domain
12 and (
13 length(body.links) == 0
14 or length(filter(body.links,
15 (
16 .display_text is null
17 and .display_url.url == sender.email.domain.root_domain
18 )
19 or .href_url.domain.domain == "aka.ms"
20 or network.whois(.display_url.domain).days_old < 30
21 )
22 ) == length(body.links)
23 )
24 and length(attachments) == 0
25 and (strings.ilike(subject.subject, "*tax*") or length(subject.subject) < 15)
26 and strings.icontains(body.current_thread.text, "tax")
27 and (
28 strings.like(body.current_thread.text,
29 "*return*",
30 "*record*",
31 "*CPA*",
32 "*filing*",
33 "*extension*"
34 )
35 or strings.ilike(body.current_thread.text,
36 "*tax preparer*",
37 "*tax*processing*"
38 )
39 )
40 and (
41 strings.ilike(body.current_thread.text,
42 "*necessary documents*",
43 "*required documents*",
44 "*paperwork*",
45 "*in search of*",
46 "*tax service*",
47 "*professional help*",
48 "*prepare*tax return*",
49 "*service*tax return*",
50 "*seeking*tax preparer*",
51 "*assist*processing*tax*",
52 "*schedule*call*",
53 "*zoom meeting*",
54 "*discuss*fees*",
55 "*W2*",
56 "*CPA*"
57
58
59 )
60 // suspicious patterns
61 or (
62 strings.icontains(body.current_thread.text, sender.display_name)
63 and 2 of (
64 (
65 length(headers.reply_to) > 0
66 and all(headers.reply_to,
67 .email.domain.root_domain != sender.email.domain.root_domain
68 )
69 ),
70 (
71 headers.return_path.email is not null
72 and headers.return_path.email != sender.email.email
73 ),
74 headers.return_path.domain.root_domain in ("amazonses.com")
75 )
76 )
77 )
78 and (
79 (
80 profile.by_sender().prevalence in ("new", "outlier")
81 and not profile.by_sender().solicited
82 )
83 or (
84 profile.by_sender().any_messages_malicious_or_spam
85 and not profile.by_sender().any_messages_benign
86 )
87 )
88 and not profile.by_sender().any_messages_benign
89
90attack_types:
91 - "BEC/Fraud"
92 - "Malware/Ransomware"
93tactics_and_techniques:
94 - "Social engineering"
95detection_methods:
96 - "Content analysis"
97 - "Natural Language Understanding"
98 - "Sender analysis"
99id: "e36b85b3-ffc6-5d73-b865-7dbdf9b4b1a0"