Brand impersonation: Aramco

Impersonation of the petroleum and natural gas company Saudi Aramco.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Aramco"
 2description: |
 3    Impersonation of the petroleum and natural gas company Saudi Aramco.
 4type: "rule"
 5severity: "medium"
 6source: |
 7  type.inbound
 8  and length(filter(body.links, .href_url.domain.valid)) < 25
 9  and (
10    strings.ilike(sender.display_name, '*aramco*')
11    or strings.ilevenshtein(sender.display_name, 'aramco') <= 1
12    or strings.ilike(sender.email.domain.domain, '*aramco*')
13    or strings.ilike(subject.subject, '*aramco*')
14  )
15  and any(ml.nlu_classifier(body.current_thread.text).entities, strings.ilike(.text, "*aramco*"))
16  and any(ml.nlu_classifier(body.current_thread.text).entities,
17          .name == "financial" or .name == "request"
18  )
19  and any(ml.nlu_classifier(body.current_thread.text).entities, .name == "urgency")
20
21  // Aramco domain negations
22  and sender.email.domain.root_domain not in~ (
23    'aramco.com', 'aramcoamericas.com', 'aramcoventures.com', 'aramcoworld.com'
24  )
25  
26  // negate emails sent by the Aston Martin Aramco F1 Team
27  and sender.email.domain.root_domain != "astonmartinf1.com"
28  
29  // negate highly trusted sender domains unless they fail DMARC authentication
30  and (
31    (
32      sender.email.domain.root_domain in $high_trust_sender_root_domains
33      and not headers.auth_summary.dmarc.pass
34    )
35    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
36  )  
37attack_types:
38  - "BEC/Fraud"
39tactics_and_techniques:
40  - "Impersonation: Brand"
41  - "Lookalike domain"
42  - "Social engineering"
43detection_methods:
44  - "Content analysis"
45  - "Header analysis"
46  - "HTML analysis"
47  - "Natural Language Understanding"
48  - "Sender analysis"
49id: "96e87699-4007-53c1-a605-ee1cd398839c"
to-top