← Back to Explore
sublimemediumRule
Domain impersonation: Freemail reply-to local lookalike with financial request
This technique takes advantage of the use of free email services for the reply-to address. By incorporating the sender domain in the local part of the reply-to address, the attacker creates a visually similar appearance to a legitimate email address.
Detection Query
type.inbound
and any(headers.reply_to,
.email.email != sender.email.email
and .email.domain.domain in $free_email_providers
and .email.email not in $sender_emails
and strings.contains(.email.local_part, sender.email.domain.sld)
)
and (
any(ml.nlu_classifier(body.current_thread.text).intents,
.name == "bec" and .confidence in ("medium", "high")
)
or (
any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "financial"
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "request"
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "urgency"
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "sender"
)
and any(ml.nlu_classifier(body.current_thread.text).intents,
.name != "benign"
)
)
)
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Raw Content
name: "Domain impersonation: Freemail reply-to local lookalike with financial request"
description: |
This technique takes advantage of the use of free email services for the reply-to address.
By incorporating the sender domain in the local part of the reply-to address, the attacker
creates a visually similar appearance to a legitimate email address.
type: "rule"
severity: "medium"
source: |
type.inbound
and any(headers.reply_to,
.email.email != sender.email.email
and .email.domain.domain in $free_email_providers
and .email.email not in $sender_emails
and strings.contains(.email.local_part, sender.email.domain.sld)
)
and (
any(ml.nlu_classifier(body.current_thread.text).intents,
.name == "bec" and .confidence in ("medium", "high")
)
or (
any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "financial"
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "request"
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "urgency"
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "sender"
)
and any(ml.nlu_classifier(body.current_thread.text).intents,
.name != "benign"
)
)
)
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Free email provider"
- "Social engineering"
detection_methods:
- "Content analysis"
- "Header analysis"
- "Natural Language Understanding"
- "Sender analysis"
id: "43026a40-4285-51a7-a42e-f08b9ee41b97"