Skip to content

Commit 7ce9c11

Browse files
[PR #3079] changed rule: Brand Impersonation: GoDaddy
1 parent c5e721c commit 7ce9c11

File tree

1 file changed

+38
-0
lines changed

1 file changed

+38
-0
lines changed
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
name: "Brand Impersonation: GoDaddy"
2+
description: "Detects messages where the sender is impersonating GoDaddy through display name manipulation or lookalike domains, while not being legitimately authenticated from GoDaddy's infrastructure."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and (
8+
regex.icontains(sender.display_name, 'godaddy')
9+
or strings.ilike(sender.display_name, "*godaddy*")
10+
or strings.ilevenshtein(sender.display_name, 'godaddy') <= 1
11+
or strings.ilike(sender.email.domain.domain, '*godaddy*')
12+
)
13+
and not (
14+
sender.email.domain.root_domain in ("godaddy.com", "registry.godaddy")
15+
and headers.auth_summary.dmarc.pass
16+
)
17+
and not profile.by_sender().solicited
18+
// negate highly trusted sender domains unless they fail DMARC authentication
19+
and (
20+
(
21+
sender.email.domain.root_domain in $high_trust_sender_root_domains
22+
and not headers.auth_summary.dmarc.pass
23+
)
24+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
25+
)
26+
27+
attack_types:
28+
- "Credential Phishing"
29+
tactics_and_techniques:
30+
- "Impersonation: Brand"
31+
- "Social engineering"
32+
detection_methods:
33+
- "Header analysis"
34+
- "Sender analysis"
35+
id: "ab51ea3f-96c5-5cc7-bbd7-4bff87ea38e3"
36+
og_id: "4130d555-40fc-5b12-bbf0-60cf5e93c15f"
37+
testing_pr: 3079
38+
testing_sha: 0497520b90e487ad75a5fa40056e4f76f3961e85

0 commit comments

Comments
 (0)