heroui logo

Brand impersonation: Sublime Security

Sublime Rules

View Source
Summary
This detection rule focuses on identifying potential impersonation attempts targeting Sublime Security's executives. It looks for email messages that come from senders who claim to be associated with the company, specifically checking the display names of senders to match known executives like 'Josh Kamdjou' and 'Ian Thiel'. It also employs a Levenshtein distance algorithm to check if the sender's email domain is similar to 'sublimesecurity.com', allowing for minor variations that could suggest phishing attempts. Messages are flagged if they come from domains not associated with Sublime Security or its trusted partner domains and meet other criteria, such as being newly identified or outlier senders, or showing malicious characteristics without false positives. The rule further incorporates a safety mechanism to ignore well-known trusted domains, unless they fail DMARC authentication, thereby reducing false positives from legitimate senders.
Categories
  • Web
  • Endpoint
  • Cloud
  • Application
Data Sources
  • User Account
  • Network Traffic
Created: 2021-02-19