Fake request for tax preparation

Unknown sender requesting assistance with tax preparation. This is associated with known threat actor activity, TA576.

Sublime rule (View on GitHub)

 1name: "Fake request for tax preparation"
 2description: "Unknown sender requesting assistance with tax preparation. This is associated with known threat actor activity, TA576."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  and length(body.current_thread.text) < 1250
 8  and any(beta.ml_topic(body.current_thread.text).topics,
 9          .name == "Financial Communications"
10  )
11  // there are no links, all the links are to aka.ms, or an extraction from a warning banner that match the senders domain
12  and (
13    length(body.links) == 0
14    or length(filter(body.links,
15                     (
16                       .display_text is null
17                       and .display_url.url == sender.email.domain.root_domain
18                     )
19                     or .href_url.domain.domain == "aka.ms"
20                     or network.whois(.display_url.domain).days_old < 30
21              )
22    ) == length(body.links)
23  )
24  and length(attachments) == 0
25  and (strings.ilike(subject.subject, "*tax*") or length(subject.subject) < 15)
26  and strings.icontains(body.current_thread.text, "tax")
27  and (
28    strings.like(body.current_thread.text,
29                 "*return*",
30                 "*record*",
31                 "*CPA*",
32                 "*filing*",
33                 "*extension*"
34    )
35    or strings.ilike(body.current_thread.text,
36                     "*tax preparer*",
37                     "*tax*processing*"
38    )
39  )
40  and (
41    strings.ilike(body.current_thread.text,
42                  "*necessary documents*",
43                  "*required documents*",
44                  "*paperwork*",
45                  "*in search of*",
46                  "*tax service*",
47                  "*professional help*",
48                  "*prepare*tax return*",
49                  "*service*tax return*",
50                  "*seeking*tax preparer*",
51                  "*assist*processing*tax*",
52                  "*schedule*call*",
53                  "*zoom meeting*",
54                  "*discuss*fees*",
55                  "*W2*",
56                  "*CPA*"
57    )
58    // suspicious patterns
59    or (
60      strings.icontains(body.current_thread.text, sender.display_name)
61      and 2 of (
62        (
63          length(headers.reply_to) > 0
64          and all(headers.reply_to,
65                  .email.domain.root_domain != sender.email.domain.root_domain
66          )
67        ),
68        (
69          headers.return_path.email is not null
70          and headers.return_path.email != sender.email.email
71        ),
72        headers.return_path.domain.root_domain in ("amazonses.com")
73      )
74    )
75  )
76  and (
77    (
78      profile.by_sender().prevalence in ("new", "outlier")
79      and not profile.by_sender().solicited
80    )
81    or (
82      profile.by_sender().any_messages_malicious_or_spam
83      and not profile.by_sender().any_messages_benign
84    )
85  )
86  and not profile.by_sender().any_messages_benign  
87attack_types:
88  - "BEC/Fraud"
89  - "Malware/Ransomware"
90tactics_and_techniques:
91  - "Social engineering"
92detection_methods:
93  - "Content analysis"
94  - "Natural Language Understanding"
95  - "Sender analysis"
96id: "e36b85b3-ffc6-5d73-b865-7dbdf9b4b1a0"
to-top