Brand impersonation: Zoom (strict)

Impersonation of the video conferencing provider Zoom. This "strict" version of this rule will only flag when the sender's display name matches those used by Zoom exactly.

Sublime rule (View on GitHub)

 1name: "Brand impersonation: Zoom (strict)"
 2description: |
 3  Impersonation of the video conferencing provider Zoom. This "strict" version of this rule 
 4  will only flag when the sender's display name matches those used by Zoom exactly.  
 5references:
 6  - "https://www.theverge.com/2020/5/12/21254921/hacker-domains-impersonating-zoom-microsoft-teams-google-meet-phishing-covid-19"
 7type: "rule"
 8severity: "medium"
 9source: |
10  type.inbound
11  and (
12    sender.display_name =~ 'zoom'
13    or sender.display_name =~ 'zoom video communications, inc.'
14    or sender.display_name =~ 'zoom call'
15  )
16  and sender.email.domain.root_domain not in (
17    'zoom.us',
18    'zuora.com',
19    'zoomgov.com',
20    'zoom.com'
21  )
22  and (
23    // if this comes from a free email provider,
24    // flag if org has never sent an email to sender's email before
25    (
26      sender.email.domain.root_domain in $free_email_providers
27      and not profile.by_sender().solicited
28    )
29    // if this comes from a custom domain,
30    // flag if org has never sent an email to sender's domain before
31    or (
32      sender.email.domain.root_domain not in $free_email_providers
33      and not profile.by_sender().solicited
34    )
35  )  
36
37attack_types:
38  - "Credential Phishing"
39tactics_and_techniques:
40  - "Impersonation: Brand"
41  - "Social engineering"
42detection_methods:
43  - "Sender analysis"
44id: "00f3d94f-7ed2-5dde-a48d-fb5fcbc20cd2"
to-top