Invoicera infrastructure abuse

This rule is tailored to flag infrastructural abuse involving Invoicera, a SaaS-based invoicing and billing platform, which has been identified as a tool in widespread spam and credential phishing campaigns.

Sublime rule (View on GitHub)

 1name: "Invoicera infrastructure abuse"
 2description: "This rule is tailored to flag infrastructural abuse involving Invoicera, a SaaS-based invoicing and billing platform, which has been identified as a tool in widespread spam and credential phishing campaigns."
 3type: "rule"
 4severity: "medium"
 5source: |
 6  type.inbound
 7  and sender.email.domain.root_domain == "invoicera.com"
 8  // suspicious recipient pattern
 9  and (
10    length(recipients.to) == 0
11    or any(recipients.to, .email.domain.valid == false)
12    or length(recipients.bcc) > 0
13  )
14  // suspicious link
15  and (
16    any(body.links,
17        .href_url.domain.root_domain in $free_file_hosts
18        or .href_url.domain.domain in $free_file_hosts
19    )
20    or any(body.links,
21           .href_url.domain.root_domain in $free_subdomain_hosts
22           and .href_url.domain.subdomain is not null
23           and .href_url.domain.subdomain != "www"
24    )
25  )
26  // mismatched reply-to
27  and (
28    headers.return_path.email is not null
29    and headers.return_path.email != sender.email.email
30  )  
31
32attack_types:
33  - "Credential Phishing"
34  - "Spam"
35tactics_and_techniques:
36  - "Free file host"
37  - "Free subdomain host"
38  - "Image as content"
39  - "Social engineering"
40detection_methods:
41  - "Content analysis"
42  - "Header analysis"
43  - "Sender analysis"
44id: "1e56f310-750b-5c26-84eb-63e78f20a6bd"
to-top