Brand impersonation: Spotify

Impersonation of Spotify.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Spotify"
 2description: |
 3    Impersonation of Spotify.
 4references:
 5  - "https://www.phishprotection.com/blog/the-latest-popular-service-to-serve-you-up-phishing-emails-spotify/"
 6type: "rule"
 7severity: "low"
 8source: |
 9  type.inbound
10  and (
11    strings.ilike(sender.display_name, '*spotify*')
12    or strings.ilevenshtein(sender.display_name, 'spotify') <= 1
13    or strings.ilike(sender.email.domain.domain, '*spotify*')
14    or (
15      regex.icontains(body.current_thread.text, 'Spotify AB\b')
16      and any(ml.logo_detect(file.message_screenshot()).brands,
17              .name == "Spotify" and .confidence != "low"
18      )
19    )
20  )
21  and sender.email.domain.root_domain not in~ (
22    'spotify.com',
23    'byspotify.com',
24    'echosign.com',
25    'fromspotify.com',
26    'anchor.fm'
27  )
28  and sender.email.domain.domain not in~ ('privaterelay.appleid.com')
29  and (
30    profile.by_sender().prevalence in ("new", "outlier")
31    or (
32      profile.by_sender().any_messages_malicious_or_spam
33      and not profile.by_sender().any_messages_benign
34    )
35  )
36
37  // negate highly trusted sender domains unless they fail DMARC authentication
38  and (
39    (
40      sender.email.domain.root_domain in $high_trust_sender_root_domains
41      and not headers.auth_summary.dmarc.pass
42    )
43    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
44  )  
45
46attack_types:
47  - "Credential Phishing"
48tactics_and_techniques:
49  - "Impersonation: Brand"
50  - "Lookalike domain"
51  - "Social engineering"
52detection_methods:
53  - "Sender analysis"
54id: "70e80f91-179d-51dc-9bbd-75f1bc6f9bb3"
to-top