Brand impersonation: Dropbox
Impersonation of Dropbox, a file sharing service.
Sublime rule (View on GitHub)
1name: "Brand impersonation: Dropbox"
2description: |
3 Impersonation of Dropbox, a file sharing service.
4type: "rule"
5severity: "medium"
6source: |
7 type.inbound
8 and (
9 strings.ilike(sender.display_name, '*dropbox*')
10 or strings.ilevenshtein(sender.display_name, 'dropbox') <= 1
11 or strings.ilike(sender.email.domain.domain, '*dropbox*')
12 )
13 and sender.email.domain.root_domain !~ 'dropbox.com'
14 and (
15 any(attachments,
16 .file_type in $file_types_images
17 and any(file.explode(.), strings.ilike(.scan.ocr.raw, "*dropbox*"))
18 )
19 or any(body.links,
20 strings.ilike(.display_text,
21 "*review*",
22 "*sign*",
23 "*view*",
24 "*completed document*",
25 "*open agreement*",
26 "*open document*"
27 )
28 and not strings.ilike(.display_text, "*view this email in*")
29 and .href_url.domain.root_domain != "dropbox.com"
30 and any(ml.nlu_classifier(body.current_thread.text).intents,
31 .name == "cred_theft" and .confidence in ("medium", "high")
32 )
33 )
34 )
35 and sender.email.email not in $recipient_emails
36
37 // negate highly trusted sender domains unless they fail DMARC authentication
38 and (
39 (
40 sender.email.domain.root_domain in $high_trust_sender_root_domains
41 and not headers.auth_summary.dmarc.pass
42 )
43 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
44 )
45
46attack_types:
47 - "Credential Phishing"
48tactics_and_techniques:
49 - "Impersonation: Brand"
50 - "Social engineering"
51detection_methods:
52 - "Content analysis"
53 - "File analysis"
54 - "Header analysis"
55 - "Sender analysis"
56id: "61f11d12-7033-53c9-a95a-df982ff31c4b"