heroui logo

DocuSign Impersonation via Spoofed Intuit Sender

Sublime Rules

View Source
Summary
This detection rule analyzes inbound email communications that appear to originate from Intuit domains while masquerading as messages from DocuSign. It focuses on identifying fraudulent sender addresses that fail SPF (Sender Policy Framework) or DMARC (Domain-based Message Authentication, Reporting & Conformance) verification attempts, which indicates the potential for spoofing. The rule applies filters ensuring that the subject line or the display name of the sender includes references to 'DocuSign', reinforcing the impersonation of legitimate DocuSign communications. This makes it particularly relevant in counteracting credential phishing attacks where adversaries impersonate trusted brands to deceive recipients.
Categories
  • Identity Management
  • Web
  • Endpoint
Data Sources
  • User Account
  • Application Log
  • Network Traffic
Created: 2025-03-26