Brand impersonation: Wells Fargo

Impersonation of Wells Fargo Bank.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Wells Fargo"
 2description: |
 3    Impersonation of Wells Fargo Bank.
 4references:
 5  - "https://www.americanbanker.com/news/wells-fargo-customers-targeted-with-phishing-attacks-using-calendar-invites"
 6  - "https://www.wellsfargo.com/biz/help/faqs/credit-card-rewards/"
 7type: "rule"
 8severity: "high"
 9source: |
10  type.inbound
11  and (
12    sender.display_name =~ 'wellsfargo'
13    or strings.ilevenshtein(sender.display_name, 'wellsfargo') <= 1
14    or regex.icontains(sender.display_name, "wells?fargo")
15    or strings.ilike(sender.email.domain.domain, '*wellsfargo*')
16    or strings.ilike(subject.subject, '*wells fargo security*')
17    or strings.ilike(body.plain.raw, '*wells fargo security team*')
18    or strings.ilike(body.html.inner_text, '*wells fargo security team*')
19  )
20  and sender.email.domain.root_domain not in~ (
21    'wellsfargo.com',
22    'wellsfargoadvisors.com',
23    'transunion.com',
24    'wellsfargoemail.com',
25    'wellsfargorewards.com',
26    'comcast-spectacor.com',
27    'investordelivery.com',
28    'comcastspectacor.com',
29    'wfadvisors.com'
30  )
31  and sender.email.email not in $recipient_emails
32  
33  // negate highly trusted sender domains unless they fail DMARC authentication
34  and
35  (
36    (
37      sender.email.domain.root_domain in $high_trust_sender_root_domains
38      and (
39        any(distinct(headers.hops, .authentication_results.dmarc is not null),
40            strings.ilike(.authentication_results.dmarc, "*fail")
41        )
42      )
43    )
44    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
45  )  
46
47attack_types:
48  - "Credential Phishing"
49tactics_and_techniques:
50  - "Impersonation: Brand"
51  - "Lookalike domain"
52  - "Social engineering"
53detection_methods:
54  - "Content analysis"
55  - "Sender analysis"
56id: "02d7301f-cc29-5031-9a1e-f013400805ba"
to-top