Brand impersonation: Aramco

Impersonation of the petroleum and natural gas company Saudi Aramco.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Aramco"
 2description: |
 3    Impersonation of the petroleum and natural gas company Saudi Aramco.
 4type: "rule"
 5severity: "medium"
 6source: |
 7  type.inbound
 8  and length(filter(body.links, .href_url.domain.valid)) < 25
 9  and (
10    strings.ilike(sender.display_name, '*aramco*')
11    or strings.ilevenshtein(sender.display_name, 'aramco') <= 1
12    or strings.ilike(sender.email.domain.domain, '*aramco*')
13    or strings.ilike(subject.subject, '*aramco*')
14  )
15  and sender.email.domain.root_domain not in~ (
16    'aramco.com', 'aramcoamericas.com', 'aramcoventures.com'
17  )
18  and any(ml.nlu_classifier(body.current_thread.text).entities, strings.ilike(.text, "*aramco*"))
19  and any(ml.nlu_classifier(body.current_thread.text).entities,
20          .name == "financial" or .name == "request"
21  )
22  and any(ml.nlu_classifier(body.current_thread.text).entities, .name == "urgency")
23  
24  // negate highly trusted sender domains unless they fail DMARC authentication
25  and (
26    (
27      sender.email.domain.root_domain in $high_trust_sender_root_domains
28      and not headers.auth_summary.dmarc.pass
29    )
30    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
31  )  
32attack_types:
33  - "BEC/Fraud"
34tactics_and_techniques:
35  - "Impersonation: Brand"
36  - "Lookalike domain"
37  - "Social engineering"
38detection_methods:
39  - "Content analysis"
40  - "Header analysis"
41  - "HTML analysis"
42  - "Natural Language Understanding"
43  - "Sender analysis"
44id: "96e87699-4007-53c1-a605-ee1cd398839c"
to-top