Link abuse: Self-service creation platform link with suspicious recipient behavior

Detects messages from new freemail senders containing links to self-service creation platforms with all-caps display text, combined with suspicious recipient patterns such as invalid recipients, self-sending, or unusual CC/BCC configurations.

Sublime rule (View on GitHub)

 1name: "Link abuse: Self-service creation platform link with suspicious recipient behavior"
 2description: "Detects messages from new freemail senders containing links to self-service creation platforms with all-caps display text, combined with suspicious recipient patterns such as invalid recipients, self-sending, or unusual CC/BCC configurations."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  // new freemail sender
 8  and profile.by_sender_email().prevalence == "new"
 9  and sender.email.domain.domain in $free_email_providers
10  // sus rcpt behavior
11  and (
12    // invalid rcpt
13    length(filter(recipients.to, .email.domain.valid)) == 0
14    // self sender
15    or (
16      length(recipients.to) == 1
17      and sender.email.email == recipients.to[0].email.email
18    )
19    // BCC is another freemail
20    or (
21      length(recipients.cc) == 1
22      and all(recipients.cc, .email.domain.domain in $free_email_providers)
23    )
24    // the recipient is another freemail with bcc
25    or (
26      length(recipients.to) == 1
27      and recipients.to[0].email.domain.domain in $free_email_providers
28      and length(recipients.bcc) > 0
29    )
30  )
31  // few body links
32  and length(body.current_thread.links) < 10
33  // the self_service_creation_platform contains a link with the display_text in all caps
34  and any(body.current_thread.links,
35          (
36            .href_url.domain.root_domain in $self_service_creation_platform_domains
37            or .href_url.domain.domain in $self_service_creation_platform_domains
38          )
39          and regex.match(.display_text, '[A-Z0-9_\-\s]+')
40  )  
41
42attack_types:
43  - "BEC/Fraud"
44  - "Credential Phishing"
45  - "Spam"
46tactics_and_techniques:
47  - "Free email provider"
48  - "Social engineering"
49detection_methods:
50  - "Header analysis"
51  - "Sender analysis"
52  - "URL analysis"
53id: "384ad135-a3c1-5d96-b864-2a6cd852406a"
to-top