
Summary
This inbound-rule flags potential sender impersonation/spoofing in email traffic. It looks for messages where any X-Source-Auth header value exists and does not match the actual sender email address. It also requires a non-empty Reply-To collection where every reply-to email has a root-domain different from the sender's domain root. Additionally, it requires natural language understanding on the thread text to produce intents, and only fires if there are intents detected and none are benign with non-low confidence. The combination of header misalignment, mismatched reply-to domains, and suspicious NL intents indicates potential spoofing or BEC/fraud attempts. The detection leverages header analysis, content analysis, and NL understanding to identify social engineering risk in inbound mail.
Categories
- Network
Data Sources
- Network Traffic
Created: 2026-05-22