← Back to Explore
sublimehighRule
Recruitee Infrastructure Abuse
Identifies inbound messages from Recruitee domains containing recruitment-related topics and application links, where the sender has limited prior history. The URLs in these messages either point to recently registered domains or appear as standalone links with application-focused text.
Detection Query
type.inbound
and sender.email.domain.root_domain == "recruitee.com"
and any(beta.ml_topic(body.current_thread.text).topics,
.name in (
"Advertising and Promotions",
"Professional and Career Development"
)
and .confidence != "low"
)
and any(body.links,
(
network.whois(.href_url.domain).days_old < 30
or length(body.links) == 1
)
and regex.icontains(.display_text, "apply|submit")
)
// use sender email, not domain, to ensure new *.recruitee.com addresses are correctly identified
and profile.by_sender_email().prevalence in ("new", "outlier")
and not profile.by_sender_email().any_messages_benign
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Raw Content
name: "Recruitee Infrastructure Abuse"
description: "Identifies inbound messages from Recruitee domains containing recruitment-related topics and application links, where the sender has limited prior history. The URLs in these messages either point to recently registered domains or appear as standalone links with application-focused text."
type: "rule"
severity: "high"
source: |
type.inbound
and sender.email.domain.root_domain == "recruitee.com"
and any(beta.ml_topic(body.current_thread.text).topics,
.name in (
"Advertising and Promotions",
"Professional and Career Development"
)
and .confidence != "low"
)
and any(body.links,
(
network.whois(.href_url.domain).days_old < 30
or length(body.links) == 1
)
and regex.icontains(.display_text, "apply|submit")
)
// use sender email, not domain, to ensure new *.recruitee.com addresses are correctly identified
and profile.by_sender_email().prevalence in ("new", "outlier")
and not profile.by_sender_email().any_messages_benign
attack_types:
- "BEC/Fraud"
- "Credential Phishing"
tactics_and_techniques:
- "Impersonation: Brand"
- "Social engineering"
detection_methods:
- "Content analysis"
- "Natural Language Understanding"
- "Sender analysis"
- "URL analysis"
- "Whois"
id: "31cab83d-f279-5db4-a0e5-c81a6e6e3d68"