
Fake message thread with a suspicious link and engaging language from an unknown sender
Sublime Rules
View SourceSummary
This detection rule identifies potentially fraudulent message threads that may contain phishing attempts, particularly those that involve financial requests. The rule analyzes incoming email messages based on various criteria: it checks for structural indicators of fake threads, such as subjects starting with 'RE:' or 'FWD:', assesses the presence of certain references and in-reply-to properties in the headers, and verifies if the sender is recognized or if their domain appears suspicious. Furthermore, it evaluates the content of the message body for language that suggests requests for financial information, urgency, or other indicators of phishing attempts, leveraging Natural Language Understanding (NLU) to classify and tag content appropriately. The rule also checks the integrity of links within the emails, ensuring they do not correspond to the sender's domain and that they follow suspicious patterns. Finally, it negates trusted sender domains unless they have failed DMARC authentication, enhancing its accuracy in real-world applications.
Categories
- Endpoint
- Web
- Cloud
- Application
Data Sources
- User Account
- Application Log
- Network Traffic
- Process
Created: 2023-05-20