Skip to content

Commit a9ce9a5

Browse files
ben-sublimemorriscodeID Generator
authored
Create impersonation_brand_wix.yml (#3046)
Co-authored-by: Sam Scholten <[email protected]> Co-authored-by: ID Generator <[email protected]>
1 parent 9ffcb09 commit a9ce9a5

File tree

1 file changed

+42
-0
lines changed

1 file changed

+42
-0
lines changed
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
name: "Brand impersonation: Wix"
2+
description: "Detects messages impersonating Wix by using similar display names or domain names, while not originating from legitimate WIX domains or failing DMARC authentication from trusted senders."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and (
8+
regex.icontains(sender.display_name, '^WIX\b')
9+
or strings.ilike(sender.email.domain.domain, 'WIX')
10+
)
11+
and not (
12+
(
13+
sender.email.domain.root_domain in~ (
14+
"wix.com",
15+
"wixforms.com",
16+
"wixemails.com",
17+
"wixanswers.com",
18+
"wix-groups.com"
19+
)
20+
and headers.auth_summary.dmarc.pass
21+
)
22+
)
23+
and not profile.by_sender().solicited
24+
// negate highly trusted sender domains unless they fail DMARC authentication
25+
and (
26+
(
27+
sender.email.domain.root_domain in $high_trust_sender_root_domains
28+
and not headers.auth_summary.dmarc.pass
29+
)
30+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
31+
)
32+
33+
attack_types:
34+
- "Credential Phishing"
35+
tactics_and_techniques:
36+
- "Impersonation: Brand"
37+
- "Lookalike domain"
38+
- "Social engineering"
39+
detection_methods:
40+
- "Header analysis"
41+
- "Sender analysis"
42+
id: "45e7b99f-94fc-5ae4-b5c9-ebfb59b04fe9"

0 commit comments

Comments
 (0)