heroui logo

Brand impersonation: Norton

Sublime Rules

View Source
Summary
This detection rule is designed to identify attempts at brand impersonation specifically targeting Norton products such as Lifelock, Norton 360, and Norton Security. It analyzes various file types and metadata associated with emails to detect potentially malicious content impersonating Norton. The rule employs a multifaceted approach, scanning for specific keywords in file names and documents, while also considering the legitimacy of the sender's email domain. Importantly, it flags emails that originate from free email service providers when the sender is not previously known or recognized. The detection logic includes checking attachment content, ensuring that the sender's domain does not match genuine Norton addresses, and taking into account reply-to mismatches which could suggest fraudulent intent. It utilizes pattern matching, content analysis, and sender metadata to assess the likelihood of phishing or malicious attempts, thus aiding in the prevention of credential theft through social engineering tactics.
Categories
  • Web
  • Endpoint
  • Cloud
  • Application
Data Sources
  • User Account
  • Network Traffic
  • File
  • Process
  • Web Credential
Created: 2021-12-01