EXPLORE
← Back to Explore
sublimehighRule

Service abuse: Cisco secure email service with financial request

Detects messages abusing Cisco's secure email service (res.cisco.com) that contain financial topics or invoice requests, with mismatched reply-to domains and undisclosed recipients.

MITRE ATT&CK

initial-accessdefense-evasion

Detection Query

type.inbound
and sender.email.domain.domain == 'res.cisco.com'
and any(headers.reply_to, .email.domain.domain != 'res.cisco.com')
and (
  length(recipients.to) == 0
  or all(recipients.to, .display_name == "Undisclosed recipients")
)
and (
  any(ml.nlu_classifier(body.current_thread.text).topics,
      .name in ("Financial Communications", "Request to View Invoice")
  )
  or any(ml.nlu_classifier(subject.base).entities, .name == "financial")
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Service abuse: Cisco secure email service with financial request"
description: "Detects messages abusing Cisco's secure email service (res.cisco.com) that contain financial topics or invoice requests, with mismatched reply-to domains and undisclosed recipients."
type: "rule"
severity: "high"
source: |
  type.inbound
  and sender.email.domain.domain == 'res.cisco.com'
  and any(headers.reply_to, .email.domain.domain != 'res.cisco.com')
  and (
    length(recipients.to) == 0
    or all(recipients.to, .display_name == "Undisclosed recipients")
  )
  and (
    any(ml.nlu_classifier(body.current_thread.text).topics,
        .name in ("Financial Communications", "Request to View Invoice")
    )
    or any(ml.nlu_classifier(subject.base).entities, .name == "financial")
  )
  

attack_types:
  - "BEC/Fraud"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Social engineering"
  - "Evasion"
detection_methods:
  - "Content analysis"
  - "Header analysis"
  - "Natural Language Understanding"
  - "Sender analysis"
id: "43a6daa8-e401-5b49-a6a2-ee9ed7e379fd"