heroui logo

Brand impersonation: Github

Sublime Rules

View Source
Summary
This rule detects potential brand impersonation attempts targeting GitHub users through email. It leverages multiple conditions to identify suspicious emails that appear to come from GitHub or its related services while applying filters to reduce false positives. Key factors include examining the sender's display name and email address for terms associated with GitHub, validating the sender's domain against a list of trusted domains, and analyzing the headers for evidence of solicitation or prior malicious activity. If an email's domain is highly trusted yet fails DMARC authentication, it further triggers an alert. This multi-faceted approach aims to ensure that only potentially malicious communications are flagged, especially those linked to credential phishing tactics using social engineering and domain spoofing techniques.
Categories
  • Cloud
  • Web
  • Identity Management
Data Sources
  • User Account
  • Logon Session
  • Network Traffic
Created: 2021-03-18