Observed IOC: Malicious reply-to root domains

Detects inbound messages with reply-to headers containing known malicious root domains. IOC list is automatically managed and hashed by the IOC pipeline from the private threat intelligence feed.

Sublime rule (View on GitHub)

 1name: "Observed IOC: Malicious reply-to root domains"
 2description: "Detects inbound messages with reply-to headers containing known malicious root domains. IOC list is automatically managed and hashed by the IOC pipeline from the private threat intelligence feed."
 3type: "rule"
 4severity: "high"
 5source: |
 6  // AUTO-GENERATED IOC LIST - DO NOT EDIT MANUALLY
 7  // Managed by automated IOC system
 8  false // no active IOCs - rule is temporarily disabled  
 9attack_types:
10  - "BEC/Fraud"
11  - "Credential Phishing"
12  - "Malware/Ransomware"
13tactics_and_techniques:
14  - "Impersonation: Domain"
15  - "Social engineering"
16detection_methods:
17  - "Header analysis"
18  - "Sender analysis"
19id: "f1a2b3c4-d5e6-4f7a-ab8c-d9e0f1a2b3c4"
to-top