EXPLORE
← Back to Explore
sublimemediumRule

DocuSign impersonation via CloudHQ links

Identifies messages containing CloudHQ share links from senders outside the CloudHQ domain who are impersonating DocuSign in either the subject line or display name.

Detection Query

type.inbound
and any(body.links,
        .href_url.domain.root_domain == "cloudhq.net"
        and strings.starts_with(.href_url.path, "/s/")
        and sender.email.domain.root_domain != 'cloudhq.net'
)

// the subject or display_name includes docusign
and (
  regex.icontains(strings.replace_confusables(subject.subject),
                  '\bdocu\s*sign\b'
  )
  or regex.icontains(strings.replace_confusables(sender.display_name),
                     '\bdocu\s*sign\b'
  )
)

// there is one unique cloudhq link in the message
and length(distinct(filter(body.links,
                           .href_url.domain.root_domain == "cloudhq.net"
                    ),
                    .href_url.url
           )
) <= 1

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "DocuSign impersonation via CloudHQ links"
description: "Identifies messages containing CloudHQ share links from senders outside the CloudHQ domain who are impersonating DocuSign in either the subject line or display name."
type: "rule"
severity: "medium"
source: |
  type.inbound
  and any(body.links,
          .href_url.domain.root_domain == "cloudhq.net"
          and strings.starts_with(.href_url.path, "/s/")
          and sender.email.domain.root_domain != 'cloudhq.net'
  )
  
  // the subject or display_name includes docusign
  and (
    regex.icontains(strings.replace_confusables(subject.subject),
                    '\bdocu\s*sign\b'
    )
    or regex.icontains(strings.replace_confusables(sender.display_name),
                       '\bdocu\s*sign\b'
    )
  )
  
  // there is one unique cloudhq link in the message
  and length(distinct(filter(body.links,
                             .href_url.domain.root_domain == "cloudhq.net"
                      ),
                      .href_url.url
             )
  ) <= 1

attack_types:
  - "Credential Phishing"
  - "BEC/Fraud"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Free file host"
detection_methods:
  - "Header analysis"
  - "URL analysis"
  - "Content analysis"
  - "Sender analysis"
id: "44ba2fee-fe36-5a53-9da8-febecab405f6"