
Summary
Detects callback scam attempts that abuse the legitimate Microsoft Power Automate service email address (flow-noreply@microsoft.com) to impersonate Microsoft and coerce users into taking urgent actions. The rule triggers on inbound messages where the sender.email.email exactly matches the known Power Automate noreply address and where the message body (current_thread.text) contains an intent labeled by an NLP classifier as "callback_scam" with a confidence level higher than low (i.e., medium or high). Detection relies on a combination of content analysis, natural language understanding, and sender analysis to identify social-engineering cues associated with callback scams and out-of-band pivots. The rule is categorized under Callback Phishing and supports SOC workflows by flagging high-risk correspondence that attempts to leverage legitimate service branding for fraud.
Categories
- Web
Data Sources
- Process
Created: 2026-03-06