Service abuse: WeTransfer callback scam
Detects callback scams originating from legitimate WeTransfer noreply address using natural language processing to identify high-confidence callback scam intent in the message body.
Sublime rule (View on GitHub)
1name: "Service abuse: WeTransfer callback scam"
2description: "Detects callback scams originating from legitimate WeTransfer noreply address using natural language processing to identify high-confidence callback scam intent in the message body."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and sender.email.email == 'noreply@wetransfer.com'
8 and any(ml.nlu_classifier(body.current_thread.text).intents,
9 .name == "callback_scam"
10 )
11attack_types:
12 - "Callback Phishing"
13tactics_and_techniques:
14 - "Social engineering"
15 - "Out of band pivot"
16detection_methods:
17 - "Content analysis"
18 - "Natural Language Understanding"
19 - "Sender analysis"
20id: "c60c8650-e76e-501b-acf8-1feeb0e45bf2"