Observed IOC: Malicious reply-to root domains
Detects inbound messages with reply-to headers containing known malicious root domains. IOC list is automatically managed and hashed by the IOC pipeline from the private threat intelligence feed.
Sublime rule (View on GitHub)
1name: "Observed IOC: Malicious reply-to root domains"
2description: "Detects inbound messages with reply-to headers containing known malicious root domains. IOC list is automatically managed and hashed by the IOC pipeline from the private threat intelligence feed."
3type: "rule"
4severity: "high"
5source: |
6 // AUTO-GENERATED IOC LIST - DO NOT EDIT MANUALLY
7 // Managed by automated IOC system
8 false // no active IOCs - rule is temporarily disabled
9attack_types:
10 - "BEC/Fraud"
11 - "Credential Phishing"
12 - "Malware/Ransomware"
13tactics_and_techniques:
14 - "Impersonation: Domain"
15 - "Social engineering"
16detection_methods:
17 - "Header analysis"
18 - "Sender analysis"
19id: "f1a2b3c4-d5e6-4f7a-ab8c-d9e0f1a2b3c4"