VIP impersonation with urgent request (first-time sender)

Sender is using a display name that matches the display name of someone in your $org_vips list.

Detects potential Business Email Compromise (BEC) attacks by analyzing text within email body first-time senders.

Sublime rule (View on GitHub)

 1name: "VIP impersonation with urgent request (first-time sender)"
 2description: |
 3  Sender is using a display name that matches the display name of someone in your $org_vips list.
 4
 5  Detects potential Business Email Compromise (BEC) attacks by analyzing text within email body first-time senders.  
 6type: "rule"
 7severity: "high"
 8source: |
 9  type.inbound
10  and any($org_vips, .display_name == sender.display_name)
11  and (
12    any(ml.nlu_classifier(body.current_thread.text).intents, .name == "bec" and .confidence == "high")
13    or (
14      any(ml.nlu_classifier(body.current_thread.text).entities, .name == "urgency")
15      and any(ml.nlu_classifier(body.current_thread.text).entities, .name == "request")
16    )
17  )
18  // first-time sender
19  and (
20    (
21      sender.email.domain.root_domain in $free_email_providers
22      and sender.email.email not in $sender_emails
23    )
24    or (
25      sender.email.domain.root_domain not in $free_email_providers
26      and sender.email.domain.domain not in $sender_domains
27    )
28  )  
29attack_types:
30  - "BEC/Fraud"
31tactics_and_techniques:
32  - "Impersonation: VIP"
33  - "Social engineering"
34detection_methods:
35  - "Content analysis"
36  - "Content analysis"
37  - "Natural Language Understanding"
38  - "Sender analysis"
39id: "0dd1fa60-6e89-5f70-81a1-6b64eef0e428"
to-top