heroui logo

Brand impersonation: Dropbox

Sublime Rules

View Source
Summary
This detection rule identifies potential phishing attempts that impersonate Dropbox, a popular file-sharing service. The rule is triggered by analyzing various factors in incoming emails. Key conditions include evaluating the sender's display name and email domain for resemblance to 'Dropbox' using string matching techniques, such as ignoring case differences and minimal typographical errors. If the email's domain does not belong to legitimate Dropbox domains and contains links that redirect to domains other than 'dropbox.com', it raises a concern. Additionally, any attachments must contain recognized file types (images) with textual content indicating association with 'Dropbox'. Analysis also involves the presence of specific call-to-action phrases often found in phishing emails, plus scrutiny of trusted domain senders failing DMARC checks. Overall, this rule aims to detect social engineering attacks leveraging brand impersonation, focusing on credential theft.
Categories
  • Network
  • Endpoint
  • Cloud
  • Web
  • Identity Management
Data Sources
  • User Account
  • Process
  • Network Traffic
  • Application Log
Created: 2023-05-30