Brand Impersonation: Stripe

Impersonation of Stripe, usually for credential theft.

Sublime rule (View on GitHub)

 1name: "Brand Impersonation: Stripe"
 2description: |
 3    Impersonation of Stripe, usually for credential theft.
 4type: "rule"
 5severity: "high"
 6source: |
 7  type.inbound
 8  and (
 9    // Display name after replacing unicode confusables is stripe
10    (
11      sender.display_name =~ 'stripe'
12      or (
13          strings.istarts_with(sender.display_name, 'stripe ')
14          and not sender.display_name in~ ('Stripe & Stare')
15      )
16      or strings.replace_confusables(sender.display_name) =~ 'stripe'
17    )
18    or (
19      // the edit distance is 1 or 2
20      strings.ilevenshtein(strings.replace_confusables(sender.display_name),
21                           'stripe'
22      ) <= 2
23      // the length is the same as "stripe"
24      and length(sender.display_name) == 6
25      // and not one of these english words that matches the edit distance
26      and not sender.display_name in~ (
27        "strive",
28        "stride",
29        "strife",
30        "strike",
31        "strobe",
32        "streps",
33        "string",
34        "scribe",
35        "straye", // a shoe company?
36        "storie", // storiesbystorie.com
37        "stryve", // a food/snack company stryve.com
38        "shrine", // common word
39        "s.ride", // cab/taxi company
40        "striim.com" // ai/data company
41      )
42    )
43  )
44  and sender.email.domain.root_domain not in~ ('stripe.com')
45  and sender.email.email not in $recipient_emails
46  
47  // Stripe adds a custom header
48  // don't match messages with the header
49  and not any(headers.hops, any(.fields, .name == "X-Stripe-EID"))
50  
51  // negate highly trusted sender domains unless they fail DMARC authentication
52  and (
53    (
54      sender.email.domain.root_domain in $high_trust_sender_root_domains
55      and not headers.auth_summary.dmarc.pass
56    )
57    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
58  )  
59attack_types:
60  - "Credential Phishing"
61tactics_and_techniques:
62  - "Impersonation: Brand"
63  - "Lookalike domain"
64  - "Social engineering"
65detection_methods:
66  - "Header analysis"
67  - "Sender analysis"
68id: "862d4654-4a32-50c1-a441-b3a5106be174"
to-top