Brand impersonation: Bank of America

Impersonation of Bank of America, usually for credential theft.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Bank of America"
 2description: |
 3    Impersonation of Bank of America, usually for credential theft.
 4references:
 5  - "https://www.techrepublic.com/article/credential-phishing-attack-impersonates-bank-of-america/"
 6type: "rule"
 7severity: "high"
 8source: |
 9  type.inbound
10  and (
11    sender.display_name =~ 'bank of america'
12    or strings.ilevenshtein(sender.display_name, 'bank of america') <= 2
13    or strings.ilike(sender.email.domain.domain, '*bankofamerica*')
14  )
15  and sender.email.domain.root_domain not in~ (
16    'bankofamerica.com',
17    'transunion.com',
18    'bofa.com',
19    'bofamerchantservices.com'
20  )
21  and sender.email.email not in $recipient_emails
22  
23  // negate highly trusted sender domains unless they fail DMARC authentication
24  and (
25    (
26      sender.email.domain.root_domain in $high_trust_sender_root_domains
27      and not headers.auth_summary.dmarc.pass
28    )
29    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
30  )  
31attack_types:
32  - "Credential Phishing"
33tactics_and_techniques:
34  - "Impersonation: Brand"
35  - "Lookalike domain"
36  - "Social engineering"
37detection_methods:
38  - "Header analysis"
39  - "Sender analysis"
40id: "d2fc6ea1-0c8d-57e0-bcaa-732a2e6b76e4"
to-top