Headers: System account impersonation with empty sender address

Detects messages with an empty sender email address and a display name impersonating system accounts like mailer-daemon, postmaster, or administrator, but lacking legitimate bounce back content as determined by natural language processing.

Sublime rule (View on GitHub)

 1name: "Headers: System account impersonation with empty sender address"
 2description: "Detects messages with an empty sender email address and a display name impersonating system accounts like mailer-daemon, postmaster, or administrator, but lacking legitimate bounce back content as determined by natural language processing."
 3type: "rule"
 4severity: "medium"
 5source: |
 6  type.inbound
 7  and sender.email.email == ""
 8  and (
 9    strings.icontains(sender.display_name, "mailer-daemon")
10    or strings.icontains(sender.display_name, "postmaster")
11  )
12  and not (
13    (
14      any(ml.nlu_classifier(body.current_thread.text).topics,
15          .name == "Bounce Back and Delivery Failure Notifications"
16          and .confidence == "high"
17      )
18      or regex.icontains(subject.subject, 'Undeliver(?:ed|able)')
19      or regex.icontains(subject.subject,
20                         'Mensagem não entregue'
21      ) // portuguese bounce back variant 
22      or regex.icontains(subject.subject,
23                         '系统退信'
24      ) // chinese bounce back variant 
25    )
26  )  
27attack_types:
28  - "BEC/Fraud"
29  - "Credential Phishing"
30tactics_and_techniques:
31  - "Impersonation: Employee"
32  - "Social engineering"
33  - "Spoofing"
34detection_methods:
35  - "Header analysis"
36  - "Sender analysis"
37  - "Natural Language Understanding"
38id: "887f7953-9dbc-5582-a4b6-b5b79cce6744"
to-top