Brand impersonation: FedEx

Impersonation of the shipping provider FedEx.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: FedEx"
 2description: |
 3    Impersonation of the shipping provider FedEx.
 4references:
 5  - "https://www.fedex.com/en-us/trust-center/report-fraud/fraudulent-email-examples.html"
 6type: "rule"
 7severity: "low"
 8source: |
 9  type.inbound
10  and (
11    sender.display_name in~ ('fedex', 'fedex shipment', 'fedex tracking updates')
12    or strings.ilevenshtein(sender.display_name, 'fedex') <= 1
13    or regex.icontains(sender.display_name, '^Fed-?ex')
14    or strings.ilike(sender.email.domain.domain, '*fedex*')
15    or (
16      any(ml.logo_detect(file.message_screenshot()).brands, .name == "FedEx")
17      and any(ml.nlu_classifier(body.current_thread.text).entities,
18              .name == "request" and strings.icontains(.text, "signature")
19      )
20    )
21  )
22  and sender.email.domain.root_domain not in~ (
23    'fedex.com',
24    'fedexfreight.com', // added 2026-05-08
25    'cj.com', // CJ is a global affiliate marketing network
26    'sedex.com', // sedex.com is not affiliated with FedEx, but is an apparent FP
27    'myworkday.com',
28    'billtrust.com',
29    'flying-cargo.rs', // Serbian arm of Fedex (https://www.fedex.com/en-rs/customer-support.html)
30    'confirmit.com', // survey/market research company
31    'centercode.com' // survey company
32  )
33  and (
34    not profile.by_sender().any_messages_benign
35    and not profile.by_sender().solicited
36  )
37  
38  // negate highly trusted sender domains unless they fail DMARC authentication
39  and (
40    (
41      sender.email.domain.root_domain in $high_trust_sender_root_domains
42      and not headers.auth_summary.dmarc.pass
43    )
44    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
45  )  
46attack_types:
47  - "Credential Phishing"
48tactics_and_techniques:
49  - "Impersonation: Brand"
50  - "Lookalike domain"
51  - "Social engineering"
52detection_methods:
53  - "Header analysis"
54  - "Sender analysis"
55id: "94a2b602-2bc1-5ea3-941e-752e3a2235cf"
to-top