Brand impersonation: Adobe with suspicious language and link

Email contains an Adobe logo, at least one link, and suspicious link language from a new sender.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Adobe with suspicious language and link"
 2description: "Email contains an Adobe logo, at least one link, and suspicious link language from a new sender."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  // all attachments are images or 0 attachments
 8  and (
 9    (
10      length(attachments) > 0
11      and all(attachments, .file_type in $file_types_images)
12    )
13    or length(attachments) == 0
14  )
15  and length(body.links) > 0
16  and any(ml.logo_detect(beta.message_screenshot()).brands,
17          .name == "Adobe" and .confidence in ("high")
18  )
19  and (
20    any(file.explode(beta.message_screenshot()),
21        strings.ilike(.scan.ocr.raw,
22                      "*review*",
23                      "*sign*",
24                      "*view*",
25                      "*completed document*",
26                      "*open agreement*",
27                      "*open document*"
28        )
29    )
30    or any(body.links,
31           strings.ilike(.display_text,
32                         "*review*",
33                         "*sign*",
34                         "*view*",
35                         "*completed document*",
36                         "*open agreement*",
37                         "*open document*"
38           )
39    )
40  )
41  and (
42    profile.by_sender().prevalence in ("new", "outlier")
43    or (
44      profile.by_sender().any_messages_malicious_or_spam
45      and not profile.by_sender().any_false_positives
46    )
47  )
48  // negate highly trusted sender domains unless they fail DMARC authentication
49  and (
50    (
51      sender.email.domain.root_domain in $high_trust_sender_root_domains
52      and (
53        any(distinct(headers.hops, .authentication_results.dmarc is not null),
54            strings.ilike(.authentication_results.dmarc, "*fail")
55        )
56      )
57    )
58    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
59  )  
60attack_types:
61  - "Credential Phishing"
62tactics_and_techniques:
63  - "Impersonation: Brand"
64  - "Social engineering"
65detection_methods:
66  - "Computer Vision"
67  - "Content analysis"
68  - "Header analysis"
69  - "Sender analysis"
70id: "32cc8bf1-f4d7-549f-a970-eade24b7c6ae"
to-top