Skip to content

Commit b7a9dd6

Browse files
[PR #3013] changed rule: Display Name Emoji with Financial Symbols
1 parent 6111bed commit b7a9dd6

File tree

1 file changed

+34
-0
lines changed

1 file changed

+34
-0
lines changed
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
name: "Display Name Emoji with Financial Symbols"
2+
description: "Detects messages where the sender's display name contains emoji characters alongside financial symbols ($ £ € ¥ ₿) in the subject line. The sender's domain is not present in the Alexa top 1 million sites and has DMARC authentication issues."
3+
type: "rule"
4+
severity: "low"
5+
source: |
6+
// Hunt for emails with emoji in sender display name and financial symbols in subject
7+
type.inbound
8+
// Check for emoji in sender display name using Unicode ranges
9+
and regex.contains(sender.display_name,
10+
'[\x{1F600}-\x{1F64F}]|[\x{1F300}-\x{1F5FF}]|[\x{1F680}-\x{1F6FF}]|[\x{1F1E0}-\x{1F1FF}]|[\x{2600}-\x{26FF}]|[\x{2700}-\x{27BF}]'
11+
)
12+
// Check for financial symbols in subject
13+
and regex.contains(subject.subject, '[\$£€¥₿]')
14+
15+
and (
16+
headers.auth_summary.dmarc.pass is null
17+
or headers.auth_summary.dmarc.pass == false
18+
)
19+
and sender.email.domain.root_domain not in $alexa_1m
20+
21+
attack_types:
22+
- "BEC/Fraud"
23+
- "Callback Phishing"
24+
tactics_and_techniques:
25+
- "Social engineering"
26+
- "Evasion"
27+
detection_methods:
28+
- "Content analysis"
29+
- "Header analysis"
30+
- "Sender analysis"
31+
id: "63d59dd1-4c33-5103-97e5-b5be5d9f2606"
32+
og_id: "f316f335-51ac-5ead-a059-53fdcb0cb50c"
33+
testing_pr: 3013
34+
testing_sha: 3ecc9b95b074bdeb0ab7cc3dbb6f43d55e109a86

0 commit comments

Comments
 (0)