← Back to Explore
sublimemediumRule
Service abuse: Recruiting with suspicious language patterns from legitimate platforms
Detects suspicious recruiting messages from legitimate services like Salesforce, LADesk, or AWS Apps with unusually long sender email addresses and recruiting-specific language patterns that may indicate abuse of trusted platforms for social engineering.
Detection Query
type.inbound
and length(sender.email.email) >= 50
and sender.email.domain.root_domain in (
"salesforce.com",
"ladesk.com",
"awsapps.com"
)
and (
(
any(ml.nlu_classifier(body.current_thread.text).topics,
.name in ("B2B Cold Outreach", "Professional and Career Development")
)
and not any(ml.nlu_classifier(body.current_thread.text).topics,
.name == "Reminders and Notifications" and .confidence == "high"
)
)
or 2 of (
strings.icontains(body.current_thread.text, "profile caught my attention"),
strings.icontains(body.current_thread.text, "recruiting top talent"),
strings.icontains(body.current_thread.text, "talent acquisition team"),
strings.icontains(body.current_thread.text,
"experience seems highly relevant"
),
strings.icontains(body.current_thread.text, "expling this opptunity"),
strings.icontains(body.current_thread.text, "your professional profile"),
strings.icontains(body.current_thread.text, "a pivotal hire"),
strings.icontains(body.current_thread.text, "a key hire"),
strings.icontains(body.current_thread.text, "schedule a time")
)
)
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Raw Content
name: "Service abuse: Recruiting with suspicious language patterns from legitimate platforms"
description: "Detects suspicious recruiting messages from legitimate services like Salesforce, LADesk, or AWS Apps with unusually long sender email addresses and recruiting-specific language patterns that may indicate abuse of trusted platforms for social engineering."
type: "rule"
severity: "medium"
source: |
type.inbound
and length(sender.email.email) >= 50
and sender.email.domain.root_domain in (
"salesforce.com",
"ladesk.com",
"awsapps.com"
)
and (
(
any(ml.nlu_classifier(body.current_thread.text).topics,
.name in ("B2B Cold Outreach", "Professional and Career Development")
)
and not any(ml.nlu_classifier(body.current_thread.text).topics,
.name == "Reminders and Notifications" and .confidence == "high"
)
)
or 2 of (
strings.icontains(body.current_thread.text, "profile caught my attention"),
strings.icontains(body.current_thread.text, "recruiting top talent"),
strings.icontains(body.current_thread.text, "talent acquisition team"),
strings.icontains(body.current_thread.text,
"experience seems highly relevant"
),
strings.icontains(body.current_thread.text, "expling this opptunity"),
strings.icontains(body.current_thread.text, "your professional profile"),
strings.icontains(body.current_thread.text, "a pivotal hire"),
strings.icontains(body.current_thread.text, "a key hire"),
strings.icontains(body.current_thread.text, "schedule a time")
)
)
attack_types:
- "BEC/Fraud"
tactics_and_techniques:
- "Social engineering"
detection_methods:
- "Content analysis"
- "Header analysis"
- "Natural Language Understanding"
- "Sender analysis"
id: "29e12696-9fab-50a5-bcbc-03c8e382853d"