← Back to Explore
sublimemediumRule
Brand impersonation: GoDaddy
Detects messages where the sender is impersonating GoDaddy through display name manipulation or lookalike domains, while not being legitimately authenticated from GoDaddy's infrastructure.
Detection Query
type.inbound
and (
regex.icontains(sender.display_name, 'godaddy')
or strings.ilike(sender.display_name, "*godaddy*")
or strings.ilevenshtein(sender.display_name, 'godaddy') <= 1
or strings.ilike(sender.email.domain.domain, '*godaddy*')
)
and not (
sender.email.domain.root_domain in (
"godaddy.com",
"registry.godaddy",
"sucuri.net"
)
and headers.auth_summary.dmarc.pass
)
and not profile.by_sender().solicited
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and not headers.auth_summary.dmarc.pass
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Raw Content
name: "Brand impersonation: GoDaddy"
description: "Detects messages where the sender is impersonating GoDaddy through display name manipulation or lookalike domains, while not being legitimately authenticated from GoDaddy's infrastructure."
type: "rule"
severity: "medium"
source: |
type.inbound
and (
regex.icontains(sender.display_name, 'godaddy')
or strings.ilike(sender.display_name, "*godaddy*")
or strings.ilevenshtein(sender.display_name, 'godaddy') <= 1
or strings.ilike(sender.email.domain.domain, '*godaddy*')
)
and not (
sender.email.domain.root_domain in (
"godaddy.com",
"registry.godaddy",
"sucuri.net"
)
and headers.auth_summary.dmarc.pass
)
and not profile.by_sender().solicited
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and not headers.auth_summary.dmarc.pass
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Impersonation: Brand"
- "Social engineering"
detection_methods:
- "Header analysis"
- "Sender analysis"
id: "4130d555-40fc-5b12-bbf0-60cf5e93c15f"