Brand impersonation: Aramco
Impersonation of the petroleum and natural gas company Saudi Aramco.
Sublime rule (View on GitHub)
1name: "Brand impersonation: Aramco"
2description: |
3 Impersonation of the petroleum and natural gas company Saudi Aramco.
4type: "rule"
5severity: "medium"
6source: |
7 type.inbound
8 and length(filter(body.links, .href_url.domain.valid)) < 25
9 and (
10 strings.ilike(sender.display_name, '*aramco*')
11 or strings.ilevenshtein(sender.display_name, 'aramco') <= 1
12 or strings.ilike(sender.email.domain.domain, '*aramco*')
13 or strings.ilike(subject.subject, '*aramco*')
14 )
15 and any(ml.nlu_classifier(body.current_thread.text).entities, strings.ilike(.text, "*aramco*"))
16 and any(ml.nlu_classifier(body.current_thread.text).entities,
17 .name == "financial" or .name == "request"
18 )
19 and any(ml.nlu_classifier(body.current_thread.text).entities, .name == "urgency")
20
21 // Aramco domain negations
22 and sender.email.domain.root_domain not in~ (
23 'aramco.com', 'aramcoamericas.com', 'aramcoventures.com', 'aramcoworld.com'
24 )
25
26 // negate emails sent by the Aston Martin Aramco F1 Team
27 and sender.email.domain.root_domain != "astonmartinf1.com"
28
29 // negate highly trusted sender domains unless they fail DMARC authentication
30 and (
31 (
32 sender.email.domain.root_domain in $high_trust_sender_root_domains
33 and not headers.auth_summary.dmarc.pass
34 )
35 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
36 )
37attack_types:
38 - "BEC/Fraud"
39tactics_and_techniques:
40 - "Impersonation: Brand"
41 - "Lookalike domain"
42 - "Social engineering"
43detection_methods:
44 - "Content analysis"
45 - "Header analysis"
46 - "HTML analysis"
47 - "Natural Language Understanding"
48 - "Sender analysis"
49id: "96e87699-4007-53c1-a605-ee1cd398839c"