heroui logo

Brand Impersonation: Shein

Sublime Rules

View Source
Summary
This detection rule is designed to identify suspicious communications that impersonate the e-commerce brand Shein. It utilizes various detection methods including display name analysis, logo detection through machine learning, and content analysis to determine the nature of the communication. The rule targets emails that use deceiving techniques, such as impersonating Shein's display name or logo, or containing content related to security, promotions, or authentication. Additionally, it excludes communications that originate from verified Shein domains and trusted senders, ensuring only potentially threatening messages are flagged. The rule's conditions also cover non-legitimate topics and malicious intents indicative of credential theft, highlighting its emphasis on protecting users from phishing attempts and spam that exploit the Shein brand.
Categories
  • Web
  • Cloud
  • Endpoint
Data Sources
  • User Account
  • Process
  • Network Traffic
Created: 2025-10-25