
Summary
This rule detects brand impersonation attempts targeting Netflix through email communication. It focuses on identifying deceptive email senders that manipulate their display names or email domains to resemble Netflix using various techniques such as regex matching and edit distance comparisons. The criteria for triggering an alert include a high likelihood of impersonation through confusable characters or slight modifications of the brand name. Additionally, a strong phishing indicator in links present within the body of the email increases the severity of the impersonation signal. The rule excludes legitimate domains owned by Netflix to prevent false positives, ensuring that only potentially malicious attempts are flagged. By analyzing the sender's display name, email domain, and the validity of the recipient's email domains, the rule effectively detects and helps to counteract credential phishing that exploits Netflix's brand reputation. With a low severity rating, this rule is critical for maintaining vigilance against social engineering attacks that may compromise user accounts.
Categories
- Web
- Identity Management
- Endpoint
Data Sources
- User Account
- Process
- Application Log
- Network Traffic
- Logon Session
Created: 2023-03-27