Brand impersonation: Office 365 mail service
Detects messages from domains containing both 'o365' and 'mail' in the second-level domain, commonly used to impersonate legitimate Microsoft Office 365 mail services.
Sublime rule (View on GitHub)
1name: "Brand impersonation: Office 365 mail service"
2description: "Detects messages from domains containing both 'o365' and 'mail' in the second-level domain, commonly used to impersonate legitimate Microsoft Office 365 mail services."
3type: "rule"
4severity: "medium"
5false_positives:
6 - "It is possible for this to match in benign domains. For recurring benign senders, apply sender exclusions to prevent unnecessary matches."
7source: |
8 type.inbound
9 and (
10 strings.icontains(sender.email.domain.sld, 'o365')
11 or strings.icontains(sender.email.domain.sld, 'outlook')
12 or strings.icontains(sender.email.domain.sld, 'office')
13 )
14 and strings.icontains(sender.email.domain.sld, 'mail')
15 // not benign use cases
16 and not (
17 sender.email.domain.root_domain in (
18 "agentofficemail.com", // mandrill app addon
19 "mdofficemail.com", // doctor office
20 "medofficemail.com", // doctor office
21 "officemailbox.fr", // bulk mail provider
22 "mail-office.fr", // bulk mail provider
23 "officedepot-mail.co.kr", // office depot in kr
24 "emailmarketdataoutlook.com", // email mrkting
25 "officelabsmail.co.uk" // company in the uk
26 )
27 and headers.auth_summary.dmarc.pass
28 )
29 and not profile.by_sender_domain().any_messages_benign
30
31attack_types:
32 - "Credential Phishing"
33tactics_and_techniques:
34 - "Impersonation: Brand"
35 - "Lookalike domain"
36 - "Social engineering"
37detection_methods:
38 - "Sender analysis"
39id: "51af3d4a-1667-50df-a99e-e3f00479564b"