Brand impersonation: Bank of America

Impersonation of Bank of America, usually for credential theft.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Bank of America"
 2description: |
 3    Impersonation of Bank of America, usually for credential theft.
 4references:
 5  - "https://www.techrepublic.com/article/credential-phishing-attack-impersonates-bank-of-america/"
 6type: "rule"
 7severity: "high"
 8source: |
 9  type.inbound
10  and (
11    sender.display_name =~ 'bank of america'
12    or strings.ilevenshtein(sender.display_name, 'bank of america') <= 2
13    or strings.ilike(sender.email.domain.domain, '*bankofamerica*')
14  )
15  and sender.email.domain.root_domain not in~ ('bankofamerica.com', 'transunion.com', 'bofa.com', 'bofamerchantservices.com')
16  and sender.email.email not in $recipient_emails
17
18  // negate highly trusted sender domains unless they fail DMARC authentication
19  and (
20    (
21      sender.email.domain.root_domain in $high_trust_sender_root_domains
22      and not headers.auth_summary.dmarc.pass
23    )
24    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
25  )  
26
27attack_types:
28  - "Credential Phishing"
29tactics_and_techniques:
30  - "Impersonation: Brand"
31  - "Lookalike domain"
32  - "Social engineering"
33detection_methods:
34  - "Header analysis"
35  - "Sender analysis"
36id: "d2fc6ea1-0c8d-57e0-bcaa-732a2e6b76e4"
to-top