Brand impersonation: Aramco

Impersonation of the petroleum and natural gas company Saudi Aramco.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Aramco"
 2description: |
 3    Impersonation of the petroleum and natural gas company Saudi Aramco.
 4type: "rule"
 5severity: "medium"
 6source: |
 7  type.inbound
 8  and length(filter(body.links, .href_url.domain.valid)) < 25
 9  and (
10    strings.ilike(sender.display_name, '*aramco*')
11    or strings.ilevenshtein(sender.display_name, 'aramco') <= 1
12    or strings.ilike(sender.email.domain.domain, '*aramco*')
13    or strings.ilike(subject.subject, '*aramco*')
14  )
15  and any(ml.nlu_classifier(body.current_thread.text).entities,
16          .name == "financial" or .name == "request"
17  )
18  and (
19    (
20      any(ml.nlu_classifier(body.current_thread.text).entities,
21          strings.ilike(.text, "*aramco*")
22      )
23      and any(ml.nlu_classifier(body.current_thread.text).entities,
24              .name == "urgency"
25      )
26    )
27    or regex.icount(body.current_thread.text, "vendor|supplier") > 3
28    or any(headers.reply_to, .email.domain.root_domain in $free_email_providers)
29    or network.whois(sender.email.domain).days_old <= 90
30    or any(headers.reply_to, network.whois(.email.domain).days_old < 90)
31  )
32  // Aramco domain negations
33  and sender.email.domain.root_domain not in~ (
34    'aramco.com',
35    'aramcoamericas.com',
36    'aramcoventures.com',
37    'aramcoworld.com',
38    'aramcodigital.com',
39    'aramcoeurope.com'
40  )
41  // negate emails sent by the Aston Martin Aramco F1 Team
42  and sender.email.domain.root_domain != "astonmartinf1.com"
43  and not strings.icontains(subject.subject, 'Aston Martin')
44  and not regex.icontains(subject.subject, 'Formula (?:One|1)', '\bF1\b')
45  
46  // negate highly trusted sender domains unless they fail DMARC authentication
47  and (
48    (
49      sender.email.domain.root_domain in $high_trust_sender_root_domains
50      and not headers.auth_summary.dmarc.pass
51    )
52    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
53  )  
54attack_types:
55  - "BEC/Fraud"
56tactics_and_techniques:
57  - "Impersonation: Brand"
58  - "Lookalike domain"
59  - "Social engineering"
60detection_methods:
61  - "Content analysis"
62  - "Header analysis"
63  - "HTML analysis"
64  - "Natural Language Understanding"
65  - "Sender analysis"
66id: "96e87699-4007-53c1-a605-ee1cd398839c"
to-top