Service Abuse: GoDaddy infrastructure

Detects messages from legitimate GoDaddy domains with suspicious indicators. Observed abused for call back phishing and extortion campaigns.

Sublime rule (View on GitHub)

 1name: "Service Abuse: GoDaddy infrastructure"
 2description: "Detects messages from legitimate GoDaddy domains with suspicious indicators. Observed abused for call back phishing and extortion campaigns."
 3type: "rule"
 4severity: "medium"
 5source: |
 6  type.inbound
 7  and length(attachments) == 0
 8  // legitimate GoDaddy sending infrastructure
 9  and (
10    sender.email.domain.root_domain == "godaddy.com"
11    and headers.auth_summary.dmarc.pass
12  )
13  and any(body.links, .display_text in~ ("Pay Now", "Accept Access"))
14  and (
15    (
16      any(ml.nlu_classifier(body.current_thread.text).intents,
17          .name in~ ("callback_scam", "cred_theft", "extortion")
18          and .confidence == "high"
19      )
20    )
21    // manual extortion indicators
22    or (
23      regex.icontains(sender.display_name,
24                      'big(\s|[[:punct:]])?brother|seeing(\s|[[:punct:]])?eye'
25      )
26      or regex.icontains(body.current_thread.text,
27                         '((I|you).{0,25}(leak|compromise|hack|see|record|expose))|(dirty|little) secret'
28      )
29    )
30    // manual callback phishing indicators
31    or (
32      // phone number in display name or subject
33      any([sender.display_name, subject.base],
34          regex.icontains(.,
35                          '\b\+?([ilo0-9]{1}.)?\(?[ilo0-9]{3}?\)?.[ilo0-9]{3}.?[ilo0-9]{4}\b'
36          )
37      )
38      // references commonly impersonated brands in body
39      or strings.ilike(strings.replace_confusables(body.current_thread.text),
40                       "*Pay?Pal*",
41                       "*Best?Buy*",
42                       "*Geek?Squad*",
43      )
44    )
45    // emojis in link display text
46    or any(body.links,
47           regex.contains(.display_text,
48                          '[\x{1F300}-\x{1F5FF}\x{1F600}-\x{1F64F}\x{1F680}-\x{1F6FF}\x{1F700}-\x{1F77F}\x{1F780}-\x{1F7FF}\x{1F900}-\x{1F9FF}\x{2600}-\x{26FF}\x{2700}-\x{27BF}\x{2300}-\x{23FF}]'
49           )
50    )
51    // links leading to cloudflare R2 or edge services
52    or any(body.links,
53           .href_url.domain.root_domain in~ ("r2.dev", "pages.dev", "workers.dev")
54    )
55  )  
56
57attack_types:
58  - "Callback Phishing"
59  - "Extortion"
60tactics_and_techniques:
61  - "Evasion"
62detection_methods:
63  - "Natural Language Understanding"
64  - "Content analysis"
65id: "8a2dd357-3ecf-5d23-bcd8-d215a5f677dd"
to-top