
Summary
This detection rule aims to identify instances of brand impersonation specifically involving the cloud service provider Digital Ocean. It focuses on detecting potentially malicious communications where the sender's display name shows similarities to 'digitalocean,' such as minor misspellings or variations. The rule leverages a combination of string similarity measurements and sender domain checks to detect impersonation attempts, ensuring that the sender's domain is not one of the verified domains associated with Digital Ocean to catch deceptive practices effectively. Additional conditions check for solicitation status of the messages and prior malicious behavior associated with the sender to filter out false positives, making the detection more accurate. This rule is particularly useful for organizations that utilize Digital Ocean's services to safeguard against phishing attacks that exploit brand trust.
Categories
- Cloud
- Web
- Identity Management
Data Sources
- User Account
- Process
- Network Traffic
Created: 2021-02-19