Skip to content

Commit 0117d9f

Browse files
[PR #3445] added rule: Brand impersonation: USPS
1 parent ca4d69b commit 0117d9f

File tree

1 file changed

+72
-0
lines changed

1 file changed

+72
-0
lines changed
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
name: "Brand impersonation: USPS"
2+
description: "Impersonation of the United States Postal Service."
3+
type: "rule"
4+
severity: "high"
5+
source: |
6+
type.inbound
7+
and (
8+
any(ml.logo_detect(file.message_screenshot()).brands, .name == "USPS")
9+
or (
10+
strings.ilike(sender.display_name, "USPS")
11+
)
12+
)
13+
and length(body.links) > 0
14+
and 2 of (
15+
any(body.links,
16+
strings.ilike(.display_text,
17+
"*check now*",
18+
"*track*",
19+
"*package*",
20+
'*view your order*'
21+
)
22+
),
23+
strings.ilike(body.current_thread.text,
24+
"*returned*to*sender*",
25+
"*redelivery*"
26+
),
27+
// impersonal greeting
28+
any(ml.nlu_classifier(body.current_thread.text).entities,
29+
.name == "recipient" and .text =~ "Customer"
30+
),
31+
// no links go to usps.com
32+
all(body.links, .href_url.domain.root_domain != "usps.com")
33+
)
34+
and (
35+
sender.email.domain.root_domain not in (
36+
"usps.com",
37+
"opinions-inmoment.com", // https://faq.usps.com/s/article/USPS-Customer-Experience-Surveys
38+
"shipup.co", // third party shipping company
39+
"withings.com" // third party shipping company
40+
)
41+
or (
42+
sender.email.domain.root_domain in (
43+
"usps.com",
44+
"opinions-inmoment.com" // https://faq.usps.com/s/article/USPS-Customer-Experience-Surveys
45+
)
46+
and not headers.auth_summary.dmarc.pass
47+
)
48+
)
49+
50+
// negate highly trusted sender domains unless they fail DMARC authentication
51+
and (
52+
(
53+
sender.email.domain.root_domain in $high_trust_sender_root_domains
54+
and not headers.auth_summary.dmarc.pass
55+
)
56+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
57+
)
58+
attack_types:
59+
- "Credential Phishing"
60+
tactics_and_techniques:
61+
- "Image as content"
62+
- "Impersonation: Brand"
63+
- "Social engineering"
64+
detection_methods:
65+
- "Computer Vision"
66+
- "Content analysis"
67+
- "Natural Language Understanding"
68+
- "Sender analysis"
69+
id: "c9ab649e-13a0-50b8-9032-b191498b9388"
70+
og_id: "28b9130a-d8e0-50af-97c9-c1b8f4c46d68"
71+
testing_pr: 3445
72+
testing_sha: cfd70dc1b2a02636ebbafb033b28b741455c9909

0 commit comments

Comments
 (0)