Brand impersonation: Bank of America

Impersonation of Bank of America, usually for credential theft.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Bank of America"
 2description: |
 3    Impersonation of Bank of America, usually for credential theft.
 4references:
 5  - "https://www.techrepublic.com/article/credential-phishing-attack-impersonates-bank-of-america/"
 6type: "rule"
 7severity: "high"
 8source: |
 9  type.inbound
10  and (
11    sender.display_name =~ 'bank of america'
12    or strings.ilevenshtein(sender.display_name, 'bank of america') <= 2
13    or strings.ilike(sender.email.domain.domain, '*bankofamerica*')
14  )
15  and sender.email.domain.root_domain not in~ (
16    'bankofamerica.com',
17    'transunion.com',
18    'bofa.com',
19    'bofamerchantservices.com'
20  )
21  and (
22    sender.email.email not in $recipient_emails
23    or (
24      length(recipients.to) == 1
25      and sender.email.email == recipients.to[0].email.email
26    )
27  )
28  
29  // negate highly trusted sender domains unless they fail DMARC authentication
30  and (
31    (
32      sender.email.domain.root_domain in $high_trust_sender_root_domains
33      and not headers.auth_summary.dmarc.pass
34    )
35    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
36  )  
37attack_types:
38  - "Credential Phishing"
39tactics_and_techniques:
40  - "Impersonation: Brand"
41  - "Lookalike domain"
42  - "Social engineering"
43detection_methods:
44  - "Header analysis"
45  - "Sender analysis"
46id: "d2fc6ea1-0c8d-57e0-bcaa-732a2e6b76e4"
to-top