heroui logo

Service abuse: Calendly callback scam detection

Sublime Rules

View Source
Summary
This rule detects potential callback phishing abuse in Calendly notification emails. It triggers on inbound messages where the sender is Calendly's no-reply address (no-reply@calendly.com) and the message body (body.current_thread.text) is analyzed by an ML natural language understanding classifier. If the classifier returns an intent named 'callback_scam' with a confidence level above 'low' (i.e., medium or high), the rule fires. The detection targets social engineering attempts that impersonate the Calendly brand to prompt a callback, aligning with callback phishing tactics. Detection methods used include Natural Language Understanding and sender analysis. The rule requires access to the inbound message content, thread context, and a trained NLU model to assign confidence to intents.
Categories
  • Endpoint
  • Application
Data Sources
  • Process
Created: 2026-05-22