Domain impersonation: Freemail reply-to local lookalike with financial request
This technique takes advantage of the use of free email services for the reply-to address. By incorporating the sender domain in the local part of the reply-to address, the attacker creates a visually similar appearance to a legitimate email address.
Sublime rule (View on GitHub)
1name: "Domain impersonation: Freemail reply-to local lookalike with financial request"
2description: |
3 This technique takes advantage of the use of free email services for the reply-to address.
4 By incorporating the sender domain in the local part of the reply-to address, the attacker
5 creates a visually similar appearance to a legitimate email address.
6type: "rule"
7severity: "medium"
8source: |
9 type.inbound
10 and any(headers.reply_to,
11 .email.email != sender.email.email
12 and .email.domain.domain in $free_email_providers
13 and .email.email not in $sender_emails
14 and strings.contains(.email.local_part, sender.email.domain.sld)
15 )
16 and (
17 any(ml.nlu_classifier(body.current_thread.text).intents,
18 .name == "bec" and .confidence in ("medium", "high")
19 )
20 or (
21 any(ml.nlu_classifier(body.current_thread.text).entities,
22 .name == "financial"
23 )
24 and any(ml.nlu_classifier(body.current_thread.text).entities,
25 .name == "request"
26 )
27 and any(ml.nlu_classifier(body.current_thread.text).entities,
28 .name == "urgency"
29 )
30 and any(ml.nlu_classifier(body.current_thread.text).entities,
31 .name == "sender"
32 )
33 and any(ml.nlu_classifier(body.current_thread.text).intents,
34 .name != "benign"
35 )
36 )
37 )
38attack_types:
39 - "Credential Phishing"
40tactics_and_techniques:
41 - "Free email provider"
42 - "Social engineering"
43detection_methods:
44 - "Content analysis"
45 - "Header analysis"
46 - "Natural Language Understanding"
47 - "Sender analysis"
48id: "43026a40-4285-51a7-a42e-f08b9ee41b97"