Google Notification alert link from non-Google sender

This rule detects messages that leverage a link to notifications.google.com not from google and from an untrusted sender. Commonly abused in salesforce phishing campaigns.

Sublime rule (View on GitHub)

 1name: "Google Notification alert link from non-Google sender"
 2description: "This rule detects messages that leverage a link to notifications.google.com not from google and from an untrusted sender. Commonly abused in salesforce phishing campaigns. "
 3type: "rule"
 4references:
 5  - "https://www.reddit.com/r/Scams/comments/15oilcr/meta_business_suite_messenger_phishing_scam_can/"
 6severity: "medium"
 7source: |
 8  type.inbound
 9  // ignore messages from google[.]com unlesss they fail DMARC authentication
10  and (
11    (
12      sender.email.domain.root_domain in ("google.com", "youtube.com", "nest.com")
13      and not headers.auth_summary.dmarc.pass
14    )
15    or sender.email.domain.root_domain not in (
16      "google.com",
17      "youtube.com",
18      "nest.com"
19    )
20  )
21  and any(body.links,
22          .href_url.domain.domain == "notifications.google.com"
23          and strings.starts_with(.href_url.path, "/g/p/")
24  )
25  and (
26    any($suspicious_subjects, strings.icontains(subject.subject, .))
27    or strings.ilike(subject.subject, '*verification*')
28  )
29  and (
30    (
31      profile.by_sender().prevalence in ("new", "outlier")
32      and not profile.by_sender().solicited
33    )
34    or (
35      profile.by_sender().any_messages_malicious_or_spam
36      and not profile.by_sender().any_messages_benign
37    )
38    // we've observed salesforce abuse
39    or sender.email.domain.root_domain == "salesforce.com"
40    or headers.return_path.domain.root_domain == "salesforce.com"
41  )
42  and not profile.by_sender().any_messages_benign  
43attack_types:
44  - "Credential Phishing"
45tactics_and_techniques:
46  - "Social engineering"
47detection_methods:
48  - "Content analysis"
49  - "Header analysis"
50  - "Sender analysis"
51  - "URL analysis"
52id: "a1c1acfd-9b3b-58a7-81f1-b2c631b02985"
to-top