Recruitee Infrastructure Abuse
Identifies inbound messages from Recruitee domains containing recruitment-related topics and application links, where the sender has limited prior history. The URLs in these messages either point to recently registered domains or appear as standalone links with application-focused text.
Sublime rule (View on GitHub)
1name: "Recruitee Infrastructure Abuse"
2description: "Identifies inbound messages from Recruitee domains containing recruitment-related topics and application links, where the sender has limited prior history. The URLs in these messages either point to recently registered domains or appear as standalone links with application-focused text."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and sender.email.domain.root_domain == "recruitee.com"
8 and any(beta.ml_topic(body.current_thread.text).topics,
9 .name in (
10 "Advertising and Promotions",
11 "Professional and Career Development"
12 )
13 and .confidence != "low"
14 )
15 and any(body.links,
16 (
17 network.whois(.href_url.domain).days_old < 30
18 or length(body.links) == 1
19 )
20 and regex.icontains(.display_text, "apply|submit")
21 )
22 // use sender email, not domain, to ensure new *.recruitee.com addresses are correctly identified
23 and profile.by_sender_email().prevalence in ("new", "outlier")
24 and not profile.by_sender_email().any_false_positives
25
26attack_types:
27 - "BEC/Fraud"
28 - "Credential Phishing"
29tactics_and_techniques:
30 - "Impersonation: Brand"
31 - "Social engineering"
32detection_methods:
33 - "Content analysis"
34 - "Natural Language Understanding"
35 - "Sender analysis"
36 - "URL analysis"
37 - "Whois"
38id: "31cab83d-f279-5db4-a0e5-c81a6e6e3d68"