heroui logo

Service Abuse: ExactTarget with suspicious sender domain

Sublime Rules

View Source
Summary
This detection rule focuses on identifying suspicious email messages that appear to originate from ExactTarget's infrastructure but use potentially malicious sender domains. The rule scrutinizes inbound messages and checks for specific conditions indicating deception or fraud. The first condition verifies if the message comes from the ExactTarget domain by analyzing the domain in the message headers. It then evaluates several factors that could be indicative of phishing attempts: emails from domains that have overly long Salesforce domains (equal to or greater than 50 characters), those from 'awsapps.com', or domains that are suspicious for containing UTF-8 encoded characters. This combination of checks aims to expose tactics commonly used in credential phishing and business email compromise schemes, characterized by evasion techniques and social engineering elements.
Categories
  • Cloud
  • Web
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Network Traffic
Created: 2025-08-29