
Summary
This detection rule identifies potential abusive messages originating from legitimate GoDaddy domains that exhibit indications of being used for callback phishing or extortion campaigns. The rule leverages multiple indicators, including the sender's email address, DMARC authentication status, and the presence of suspicious phrases or links in the message body. It utilizes natural language understanding (NLU) to classify intents related to scams and to extract context from the text. The detection logic is further strengthened by examining the features of the email, such as the existence of certain keywords, patterns in sender information, and the structure of hyperlinks, particularly those leading to domains associated with cloud services like Cloudflare. Given these sophisticated parameters, the rule focuses on flagging potentially harmful emails that could deceive users into providing sensitive data or monetary payments.
Categories
- Web
- Cloud
- Identity Management
- Endpoint
Data Sources
- User Account
- Web Credential
- Network Traffic
- Application Log
Created: 2026-01-08