DocuSign Impersonation via Spoofed Intuit Sender
Detects messages appearing to come from Intuit domains with authentication failures while masquerading as DocuSign communications. The sender fails either SPF or DMARC verification, and includes DocuSign branding in either the subject line or display name.
Sublime rule (View on GitHub)
1name: "DocuSign Impersonation via Spoofed Intuit Sender"
2description: "Detects messages appearing to come from Intuit domains with authentication failures while masquerading as DocuSign communications. The sender fails either SPF or DMARC verification, and includes DocuSign branding in either the subject line or display name."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and sender.email.domain.root_domain in ("intuit.com")
8 // email auth fails
9 and (
10 not headers.auth_summary.spf.pass
11 or not coalesce(headers.auth_summary.dmarc.pass, false)
12 )
13 // the subject or display_name includes docusign
14 and (
15 strings.icontains(subject.subject, "docusign")
16 or strings.icontains(sender.display_name, "docusign")
17 )
18attack_types:
19 - "Credential Phishing"
20tactics_and_techniques:
21 - "Impersonation: Brand"
22 - "Spoofing"
23detection_methods:
24 - "Header analysis"
25 - "Sender analysis"
26id: "d437710b-ad4e-5618-93de-f559aa27ad8a"