EXPLORE
← Back to Explore
sublimemediumRule

Brand impersonation: Office 365 mail service

Detects messages from domains containing both 'o365' and 'mail' in the second-level domain, commonly used to impersonate legitimate Microsoft Office 365 mail services.

Detection Query

type.inbound
and (
  strings.icontains(sender.email.domain.sld, 'o365')
  or strings.icontains(sender.email.domain.sld, 'outlook')
  or strings.icontains(sender.email.domain.sld, 'office')
)
and strings.icontains(sender.email.domain.sld, 'mail')
// not benign use cases
and not (
  sender.email.domain.root_domain in (
    "agentofficemail.com", // mandrill app addon
    "mdofficemail.com", // doctor office
    "medofficemail.com", // doctor office
    "officemailbox.fr", // bulk mail provider
    "mail-office.fr", // bulk mail provider
    "officedepot-mail.co.kr", // office depot in kr
    "emailmarketdataoutlook.com", // email mrkting 
    "officelabsmail.co.uk" // company in the uk
  )
  and headers.auth_summary.dmarc.pass
)
and not profile.by_sender_domain().any_messages_benign

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Brand impersonation: Office 365 mail service"
description: "Detects messages from domains containing both 'o365' and 'mail' in the second-level domain, commonly used to impersonate legitimate Microsoft Office 365 mail services."
type: "rule"
severity: "medium"
false_positives:
  - "It is possible for this to match in benign domains.  For recurring benign senders, apply sender exclusions to prevent unnecessary matches."
source: |
  type.inbound
  and (
    strings.icontains(sender.email.domain.sld, 'o365')
    or strings.icontains(sender.email.domain.sld, 'outlook')
    or strings.icontains(sender.email.domain.sld, 'office')
  )
  and strings.icontains(sender.email.domain.sld, 'mail')
  // not benign use cases
  and not (
    sender.email.domain.root_domain in (
      "agentofficemail.com", // mandrill app addon
      "mdofficemail.com", // doctor office
      "medofficemail.com", // doctor office
      "officemailbox.fr", // bulk mail provider
      "mail-office.fr", // bulk mail provider
      "officedepot-mail.co.kr", // office depot in kr
      "emailmarketdataoutlook.com", // email mrkting 
      "officelabsmail.co.uk" // company in the uk
    )
    and headers.auth_summary.dmarc.pass
  )
  and not profile.by_sender_domain().any_messages_benign

attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Lookalike domain"
  - "Social engineering"
detection_methods:
  - "Sender analysis"
id: "51af3d4a-1667-50df-a99e-e3f00479564b"