Brand impersonation: UPS

Impersonation of United Parcel Service (UPS).

Sublime rule (View on GitHub)

 1name: "Brand impersonation: UPS"
 2description: |
 3    Impersonation of United Parcel Service (UPS).
 4references:
 5  - "https://www.bleepingcomputer.com/news/security/phishing-campaign-uses-upscom-xss-vuln-to-distribute-malware/"
 6  - "https://twitter.com/DanielGallagher/status/1429794038463479813"
 7  - "https://www.ups.com/us/en/help-center/legal-terms-conditions/fight-fraud/recognize.page"
 8type: "rule"
 9severity: "low"
10source: |
11  type.inbound
12  and sender.email.domain.root_domain not in ("ups.com", "upsemail.com")
13  and (
14    sender.display_name =~ "UPS My Choice"
15    or strings.ilike(sender.email.local_part, "*united*parcel*service*")
16    or strings.ilike(sender.email.domain.domain, '*united*parcel*service*')
17    or sender.email.local_part =~ "ups"
18  )
19  and any(ml.logo_detect(beta.message_screenshot()).brands, .name is not null)
20  and sender.email.email not in $recipient_emails
21
22  // negate highly trusted sender domains unless they fail DMARC authentication
23  and (
24    (
25      sender.email.domain.root_domain in $high_trust_sender_root_domains
26      and not headers.auth_summary.dmarc.pass
27    )
28    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
29  )  
30
31attack_types:
32  - "Credential Phishing"
33tactics_and_techniques:
34  - "Impersonation: Brand"
35  - "Lookalike domain"
36  - "Social engineering"
37detection_methods:
38  - "Computer Vision"
39  - "Sender analysis"
40id: "73b68869-5720-5dc3-b4bc-15730de972d8"
to-top