Fake request for tax preparation
Unknown sender requesting assistance with tax preparation. This is associated with known threat actor activity, TA576.
Sublime rule (View on GitHub)
1name: "Fake request for tax preparation"
2description: "Unknown sender requesting assistance with tax preparation. This is associated with known threat actor activity, TA576."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and length(body.current_thread.text) < 1250
8 // there are no links, all the links are to aka.ms, or an extraction from a warning banner that match the senders domain
9 and (
10 length(body.links) == 0
11 or length(filter(body.links,
12 (
13 .display_text is null
14 and .display_url.url == sender.email.domain.root_domain
15 )
16 or .href_url.domain.domain == "aka.ms"
17 or network.whois(.display_url.domain).days_old < 30
18 )
19 ) == length(body.links)
20 )
21 and length(attachments) == 0
22 and strings.ilike(subject.subject, "*tax*")
23 and strings.icontains(body.current_thread.text, "tax")
24 and (
25 strings.like(body.current_thread.text,
26 "*return*",
27 "*record*",
28 "*CPA*",
29 "*filing*",
30 "*extension*"
31 )
32 or strings.ilike(body.current_thread.text, "*tax preparer*", "*tax*processing*")
33 )
34 and (
35 strings.ilike(body.current_thread.text,
36 "*necessary documents*",
37 "*required documents*",
38 "*paperwork*need*",
39 "*in search of*",
40 "*tax service*",
41 "*professional help*",
42 "*prepare*tax return*",
43 "*service*tax return*",
44 "*seeking*tax preparer*",
45 "*assist*processing*tax*",
46 "*schedule*call*",
47 "*zoom meeting*",
48 "*discuss*fees*"
49 )
50 // suspicious patterns
51 or (
52 strings.icontains(body.current_thread.text, sender.display_name)
53 and 2 of (
54 (
55 length(headers.reply_to) > 0
56 and all(headers.reply_to,
57 .email.domain.root_domain != sender.email.domain.root_domain
58 )
59 ),
60 (
61 headers.return_path.email is not null
62 and headers.return_path.email != sender.email.email
63 ),
64 headers.return_path.domain.root_domain in ("amazonses.com")
65 )
66 )
67 )
68 and (
69 (
70 profile.by_sender().prevalence in ("new", "outlier")
71 and not profile.by_sender().solicited
72 )
73 or (
74 profile.by_sender().any_messages_malicious_or_spam
75 and not profile.by_sender().any_false_positives
76 )
77 )
78 and not profile.by_sender().any_false_positives
79
80attack_types:
81 - "BEC/Fraud"
82 - "Malware/Ransomware"
83tactics_and_techniques:
84 - "Social engineering"
85detection_methods:
86 - "Content analysis"
87 - "Natural Language Understanding"
88 - "Sender analysis"
89id: "e36b85b3-ffc6-5d73-b865-7dbdf9b4b1a0"