Brand impersonation: United Healthcare

Detects messages impersonating United Healthcare (UHC) by analyzing display names that contain variations of 'United Healthcare' or 'UHC', including those with character substitutions. The rule excludes legitimate messages from verified UHC domains that pass DMARC authentication and handles high-trust sender domains appropriately.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: United Healthcare"
 2description: "Detects messages impersonating United Healthcare (UHC) by analyzing display names that contain variations of 'United Healthcare' or 'UHC', including those with character substitutions. The rule excludes legitimate messages from verified UHC domains that pass DMARC authentication and handles high-trust sender domains appropriately."
 3type: "rule"
 4severity: "medium"
 5source: |
 6  type.inbound
 7  and (
 8    // display name contains UHC
 9    (
10      strings.ilike(strings.replace_confusables(sender.display_name),
11                    '*united healthcare*'
12      )
13      or strings.ilike(strings.replace_confusables(sender.display_name), 'UHC*')
14      or regex.icontains(sender.display_name, 'united ?health ?care')
15    )
16    // levenshtein distance similar to UHC
17    or strings.ilevenshtein(strings.replace_confusables(sender.display_name),
18                            'united healthcare'
19    ) <= 1
20    or (
21      regex.icontains(body.current_thread.text, 'united ?health ?care')
22      and (
23        regex.icontains(body.current_thread.text, 'quick .{0,10}survey')
24        // Free benefits/items lure commonly used in UHC impersonation
25        or regex.icontains(body.current_thread.text,
26          'dental (benefits?|coverage).{0,50}(free|eligible|no.{0,10}cost)'
27        )
28        or regex.icontains(body.current_thread.text,
29          'free.{0,30}(toothbrush|dental|benefit)'
30        )
31      )
32    )
33    // Brand name in sender local part from non-UHC domain
34    or (
35      strings.icontains(sender.email.local_part, "unitedhealthcare")
36      and sender.email.domain.root_domain not in (
37        "uhc.com",
38        "unitedhealthcare.com",
39        "uhcmedicaresolutions.com",
40        "unitedhealthcareupdate.com",
41        "yourhealth-wellnessteam.com",
42        "uhc-customer.com",
43        "leavesource.com"
44      )
45    )
46  )
47  // and the sender is not in org_domains or from UHC domains and passes auth
48  and not (
49    sender.email.domain.root_domain in $org_domains
50    or (
51      (
52        sender.email.domain.root_domain in (
53          "uhc.com",
54          "unitedhealthcare.com",
55          "uhcmedicaresolutions.com",
56          "unitedhealthcareupdate.com",
57          "yourhealth-wellnessteam.com",
58          "uhc-customer.com",
59          "leavesource.com"
60        )
61        or sender.display_name in (
62          "UHCOM Faculty Affairs",
63          "UHC Construction Services"
64        )
65      )
66      and headers.auth_summary.dmarc.pass
67    )
68  )
69  // negate UHC job related posting
70  and not any(ml.nlu_classifier(body.current_thread.text).topics,
71              .name == "Professional and Career Development"
72              and .confidence == "high"
73  )
74  // and the sender is not from high trust sender root domains
75  and (
76    (
77      sender.email.domain.root_domain in $high_trust_sender_root_domains
78      and not headers.auth_summary.dmarc.pass
79    )
80    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
81  )  
82
83attack_types:
84  - "Credential Phishing"
85tactics_and_techniques:
86  - "Impersonation: Brand"
87  - "Social engineering"
88detection_methods:
89  - "Header analysis"
90  - "Sender analysis"
91id: "f8dfff1a-8f3e-5301-b2d7-b68a78ad34db"
to-top