Google Notification alert link from non-Google sender

This rule detects messages that leverage a link to notifications.google.com not from google and from an untrusted sender. Commonly abused in salesforce phishing campaigns.

Sublime rule (View on GitHub)

 1name: "Google Notification alert link from non-Google sender"
 2description: "This rule detects messages that leverage a link to notifications.google.com not from google and from an untrusted sender. Commonly abused in salesforce phishing campaigns. "
 3type: "rule"
 4references:
 5  - "https://www.reddit.com/r/Scams/comments/15oilcr/meta_business_suite_messenger_phishing_scam_can/"
 6severity: "medium"
 7source: |
 8  type.inbound
 9  // ignore messages from google[.]com unlesss they fail DMARC authentication
10  and (
11    (
12      sender.email.domain.root_domain in ("google.com", "youtube.com")
13      and (
14        any(distinct(headers.hops, .authentication_results.dmarc is not null),
15            strings.ilike(.authentication_results.dmarc, "*fail")
16        )
17      )
18    )
19    or sender.email.domain.root_domain not in ("google.com", "youtube.com")
20  )
21  and any(body.links,
22          .href_url.domain.domain == "notifications.google.com"
23          and strings.starts_with(.href_url.path, "/g/p/")
24  )
25  and any($suspicious_subjects, strings.icontains(subject.subject, .))
26  and (
27    (
28      profile.by_sender().prevalence in ("new", "outlier")
29      and not profile.by_sender().solicited
30    )
31    or (
32      profile.by_sender().any_messages_malicious_or_spam
33      and not profile.by_sender().any_false_positives
34    )
35    // we've observed salesforce abuse
36    or sender.email.domain.root_domain == "salesforce.com"
37    or headers.return_path.domain.root_domain == "salesforce.com"
38  )
39  and not profile.by_sender().any_false_positives  
40attack_types:
41  - "Credential Phishing"
42tactics_and_techniques:
43  - "Social engineering"
44detection_methods:
45  - "Content analysis"
46  - "Header analysis"
47  - "Sender analysis"
48  - "URL analysis"
49id: "a1c1acfd-9b3b-58a7-81f1-b2c631b02985"
to-top