EXPLORE
← Back to Explore
sublimemediumRule

Brand impersonation: Venmo

Impersonation of Venmo

Detection Query

type.inbound
and (
  strings.ilike(sender.display_name, '*venmo*')
  or strings.ilevenshtein(sender.display_name, 'venmo') <= 1
)
and sender.email.domain.root_domain not in~ (
  'venmo.com',
  'synchronybank.com',
  'venmocreditsurvey.com',
  'venmo-experience.com',
  'synchrony.com'
)

// and not if the sender.display.name contains "via" and dmarc pass from venmo.com
and not (
  (
    headers.auth_summary.dmarc.pass
    and headers.auth_summary.dmarc.details.from.root_domain == "venmo.com"
  )
  and strings.contains(sender.display_name, "via")
)

// negate highly trusted sender domains unless they fail DMARC authentication
and (
  (
    sender.email.domain.root_domain in $high_trust_sender_root_domains
    and not headers.auth_summary.dmarc.pass
  )
  or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)

// and no false positives and not solicited
and (
  not profile.by_sender().any_messages_benign
  and not profile.by_sender().solicited
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Brand impersonation: Venmo"
description: |
  Impersonation of Venmo
references:
  - "https://whnt.com/taking-action/bbb-consumer-alerts/new-venmo-scam-tricks-users/"
type: "rule"
severity: "medium"
source: |
  type.inbound
  and (
    strings.ilike(sender.display_name, '*venmo*')
    or strings.ilevenshtein(sender.display_name, 'venmo') <= 1
  )
  and sender.email.domain.root_domain not in~ (
    'venmo.com',
    'synchronybank.com',
    'venmocreditsurvey.com',
    'venmo-experience.com',
    'synchrony.com'
  )
  
  // and not if the sender.display.name contains "via" and dmarc pass from venmo.com
  and not (
    (
      headers.auth_summary.dmarc.pass
      and headers.auth_summary.dmarc.details.from.root_domain == "venmo.com"
    )
    and strings.contains(sender.display_name, "via")
  )
  
  // negate highly trusted sender domains unless they fail DMARC authentication
  and (
    (
      sender.email.domain.root_domain in $high_trust_sender_root_domains
      and not headers.auth_summary.dmarc.pass
    )
    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
  )
  
  // and no false positives and not solicited
  and (
    not profile.by_sender().any_messages_benign
    and not profile.by_sender().solicited
  )
attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Lookalike domain"
  - "Social engineering"
detection_methods:
  - "Sender analysis"
id: "0ab15d4f-865f-518c-b54d-81043399e6f2"