Brand impersonation: Okta
Impersonation of Okta, an identity and access management company.
Sublime rule (View on GitHub)
1name: "Brand impersonation: Okta"
2description: "Impersonation of Okta, an identity and access management company."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and (
8 regex.icontains(sender.display_name, '\bOkta\b')
9 or strings.ilike(sender.email.domain.domain, '*Okta*')
10 or strings.ilike(subject.subject, '*Okta*')
11 )
12 and not (
13 length(headers.references) > 0
14 or any(headers.hops, any(.fields, strings.ilike(.name, "In-Reply-To")))
15 )
16 and not (
17 sender.email.domain.root_domain in~ (
18 'oktacdn.com',
19 'okta.com',
20 'okta-emea.com',
21 'okta-gov.com',
22 'oktapreview.com',
23 'polaris.me'
24 )
25 and headers.auth_summary.dmarc.pass
26 )
27 and any(ml.logo_detect(beta.message_screenshot()).brands,
28 .name == "Okta" and .confidence in ("medium", "high")
29 )
30 and (
31 profile.by_sender().prevalence in ("new", "outlier")
32 or (
33 profile.by_sender().any_messages_malicious_or_spam
34 and not profile.by_sender().any_false_positives
35 )
36 )
37 // negate okta relay
38 and not any(distinct(headers.domains, .domain is not null),
39 .domain == "mailrelay.okta.com"
40 )
41 // negate highly trusted sender domains unless they fail DMARC authentication
42 and (
43 (
44 sender.email.domain.root_domain in $high_trust_sender_root_domains
45 and not headers.auth_summary.dmarc.pass
46 )
47 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
48 )
49
50attack_types:
51 - "Credential Phishing"
52tactics_and_techniques:
53 - "Impersonation: Brand"
54 - "Lookalike domain"
55 - "Social engineering"
56detection_methods:
57 - "Computer Vision"
58 - "Content analysis"
59 - "Header analysis"
60 - "Sender analysis"
61id: "b7a2989a-a5ef-5340-b1d0-6b7c51462855"