Fake shipping notification with link to free file hosting

This rule detects spam emails impersonating FedEx, UPS, or USPS with links to free file hosting.

Sublime rule (View on GitHub)

 1name: "Fake shipping notification with link to free file hosting"
 2description: |
 3    This rule detects spam emails impersonating FedEx, UPS, or USPS with links to free file hosting.
 4references:
 5  - "https://playground.sublimesecurity.com?id=64feb22a-03e8-4d8f-83f6-a828dc5e3540"
 6severity: "low"
 7type: "rule"
 8source: |
 9  type.inbound
10  and length(attachments) == 0
11  and (
12    regex.icontains(coalesce(body.html.inner_text, body.html.display_text),
13                    '\bf[ _]?e[ _]?d[ _]?e[ _]?x\b'
14    )
15    and sender.email.domain.domain != "fedex.com"
16    and headers.return_path.domain.domain != sender.email.domain.domain
17    and any(body.links, strings.contains(.display_text, "track"))
18    and length(body.links) < 10
19  )
20  and any(body.links,
21          .href_url.domain.domain in $free_file_hosts
22          or .href_url.domain.root_domain in $free_file_hosts
23  )
24  and (
25    (
26      sender.email.domain.root_domain in $free_email_providers
27      and sender.email.email not in $sender_emails
28    )
29    or (
30      sender.email.domain.root_domain not in $free_email_providers
31      and sender.email.domain.root_domain not in $sender_domains
32    )
33    or sender.email.domain.valid == false
34  )  
35
36attack_types:
37  - "Spam"
38tactics_and_techniques:
39  - "Free file host"
40  - "Impersonation: Brand"
41  - "Social engineering"
42detection_methods:
43  - "Content analysis"
44  - "Header analysis"
45  - "Sender analysis"
46id: "6d3fe05e-8ee6-586e-a2c6-60488ecf347a"
to-top