EXPLORE
← Back to Explore
sublimehighRule

Link abuse: Self-service creation platform link with suspicious recipient behavior

Detects messages from new freemail senders containing links to self-service creation platforms with all-caps display text, combined with suspicious recipient patterns such as invalid recipients, self-sending, or unusual CC/BCC configurations.

MITRE ATT&CK

initial-access

Detection Query

type.inbound
// new freemail sender
and profile.by_sender_email().prevalence == "new"
and sender.email.domain.domain in $free_email_providers
// sus rcpt behavior
and (
  // invalid rcpt
  length(filter(recipients.to, .email.domain.valid)) == 0
  // self sender
  or (
    length(recipients.to) == 1
    and sender.email.email == recipients.to[0].email.email
  )
  // BCC is another freemail
  or (
    length(recipients.cc) == 1
    and all(recipients.cc, .email.domain.domain in $free_email_providers)
  )
  // the recipient is another freemail with bcc
  or (
    length(recipients.to) == 1
    and recipients.to[0].email.domain.domain in $free_email_providers
    and length(recipients.bcc) > 0
  )
)
// few body links
and length(body.current_thread.links) < 10
// the self_service_creation_platform contains a link with the display_text in all caps
and any(body.current_thread.links,
        (
          .href_url.domain.root_domain in $self_service_creation_platform_domains
          or .href_url.domain.domain in $self_service_creation_platform_domains
        )
        and regex.match(.display_text, '[A-Z0-9_\-\s]+')
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Link abuse: Self-service creation platform link with suspicious recipient behavior"
description: "Detects messages from new freemail senders containing links to self-service creation platforms with all-caps display text, combined with suspicious recipient patterns such as invalid recipients, self-sending, or unusual CC/BCC configurations."
type: "rule"
severity: "high"
source: |
  type.inbound
  // new freemail sender
  and profile.by_sender_email().prevalence == "new"
  and sender.email.domain.domain in $free_email_providers
  // sus rcpt behavior
  and (
    // invalid rcpt
    length(filter(recipients.to, .email.domain.valid)) == 0
    // self sender
    or (
      length(recipients.to) == 1
      and sender.email.email == recipients.to[0].email.email
    )
    // BCC is another freemail
    or (
      length(recipients.cc) == 1
      and all(recipients.cc, .email.domain.domain in $free_email_providers)
    )
    // the recipient is another freemail with bcc
    or (
      length(recipients.to) == 1
      and recipients.to[0].email.domain.domain in $free_email_providers
      and length(recipients.bcc) > 0
    )
  )
  // few body links
  and length(body.current_thread.links) < 10
  // the self_service_creation_platform contains a link with the display_text in all caps
  and any(body.current_thread.links,
          (
            .href_url.domain.root_domain in $self_service_creation_platform_domains
            or .href_url.domain.domain in $self_service_creation_platform_domains
          )
          and regex.match(.display_text, '[A-Z0-9_\-\s]+')
  )

attack_types:
  - "BEC/Fraud"
  - "Credential Phishing"
  - "Spam"
tactics_and_techniques:
  - "Free email provider"
  - "Social engineering"
detection_methods:
  - "Header analysis"
  - "Sender analysis"
  - "URL analysis"
id: "384ad135-a3c1-5d96-b864-2a6cd852406a"