
Summary
This rule is designed to detect attempts of brand impersonation specifically targeting Ripple cryptocurrency. Attackers may use tactics like creating phishing emails that superficially appear to come from Ripple to deceive individuals. The detection logic looks for emails where the display name contains 'ripple', but the sender's email domain does not come from official Ripple domains ("ripple.com" or "ripplejobs.co.uk"). Additionally, the rule checks for two scenarios: whether the email is unsolicited (not directly requested by the recipient) or if the sender has a history of malignancy (previously engaged in sending malicious or spam messages) with no prior false positives recorded. The severity of detections based on this rule is low, indicating that while the risk is present, it may not be immediate or critical at all times. Key discovery elements involve sender analysis to validate if the email's context is legitimate or malicious.
Categories
- Web
- Identity Management
Data Sources
- User Account
- Network Traffic
- Application Log
Created: 2022-01-21