HR Impersonation via E-sign Agreement Comment

This rule inspects messages originating from legitimate e-signature platform infrastructure, with engaging language in the body that matches HR Impersonation criteria.

Sublime rule (View on GitHub)

 1name: "HR Impersonation via E-sign Agreement Comment"
 2description: "This rule inspects messages originating from legitimate e-signature platform infrastructure, with engaging language in the body that matches HR Impersonation criteria."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  and length(attachments) == 0
 8  
 9  // Legitimate Docusign sending infratructure
10  and (
11    sender.email.domain.root_domain in (
12      'docusign.net',
13      'docusign.com',
14      'hellosign.com'
15    )
16    // docusing.com as a reply-to is used in updates to documents, such as views, signs, etc
17    and not any(headers.reply_to, .email.domain.domain == 'docusign.com')
18    // check for SPF or DMARC passed
19    and (headers.auth_summary.spf.pass or headers.auth_summary.dmarc.pass)
20  )
21  
22  // HR Impersonation in body
23  and regex.icontains(body.current_thread.text,
24                      (
25                        '(\bh\W?r\W?\b|human\s?resources|hr depart(ment)?|employee relations)'
26                      )
27  )
28  
29  // Request and Urgency
30  and (
31    any(ml.nlu_classifier(body.current_thread.text).entities, .name == "request")
32    and (
33      any(ml.nlu_classifier(body.current_thread.text).intents,
34          .name == "cred_theft" and .confidence == "high"
35      )
36      or any(ml.nlu_classifier(body.current_thread.text).entities,
37             .name in ("urgency", "financial")
38      )
39    )
40  )
41  and (
42    any(ml.nlu_classifier(body.current_thread.text).intents, .name != "benign")
43    or length(ml.nlu_classifier(body.current_thread.text).intents) == 0 // not benign but not malicious either
44  )
45  
46  // Negate legitimate HR docusigns originating from within the org
47  and not (all(headers.reply_to, .email.domain.root_domain in $org_domains))
48  
49  // Negate replies
50  and (
51    length(headers.references) == 0
52    or not any(headers.hops, any(.fields, strings.ilike(.name, "In-Reply-To")))
53  )  
54
55attack_types:
56  - "BEC/Fraud"
57  - "Credential Phishing"
58tactics_and_techniques:
59  - "Evasion"
60  - "Impersonation: Brand"
61  - "Out of band pivot"
62  - "Social engineering"
63detection_methods:
64  - "Content analysis"
65  - "Header analysis"
66  - "Natural Language Understanding"
67  - "Sender analysis"
68id: "796c6f0f-7571-5b87-b53e-97948e8be474"
to-top