← Back to Explore
sublimemediumRule
Xero invoice abuse
Detects suspicious Xero invoice communications containing urgent payment requests where the sender's display name contains either confusable characters or impersonates internal services like HR or IT support.
Detection Query
type.inbound
and sender.email.domain.root_domain == "xero.com"
and (
// contains legitimate xero invoice links
any(body.links,
.href_url.domain.domain == "in.xero.com"
or (
.href_url.domain.root_domain == "mimecastprotect.com"
and .href_url.query_params == "domain=in.xero.com"
)
)
// or financial communications with invoice content and urgency
and (
any(beta.ml_topic(body.current_thread.text).topics,
.name == "Financial Communications" and .confidence != "low"
)
and any(ml.nlu_classifier(body.current_thread.text).tags,
.name == "invoice" and .confidence in ("medium", "high")
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "urgency"
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "request"
)
)
)
and (
// display name contains confusables (brand impersonation)
sender.display_name != strings.replace_confusables(sender.display_name)
// or HR/recruitment/employment/internal service impersonation
or regex.icontains(sender.display_name,
'\bhr\b|human resources|staffing|recruiting|recruitment|employment|payroll|it support|help ?desk|admin|administrator'
)
)
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Raw Content
name: "Xero invoice abuse"
description: "Detects suspicious Xero invoice communications containing urgent payment requests where the sender's display name contains either confusable characters or impersonates internal services like HR or IT support."
type: "rule"
severity: "medium"
source: |
type.inbound
and sender.email.domain.root_domain == "xero.com"
and (
// contains legitimate xero invoice links
any(body.links,
.href_url.domain.domain == "in.xero.com"
or (
.href_url.domain.root_domain == "mimecastprotect.com"
and .href_url.query_params == "domain=in.xero.com"
)
)
// or financial communications with invoice content and urgency
and (
any(beta.ml_topic(body.current_thread.text).topics,
.name == "Financial Communications" and .confidence != "low"
)
and any(ml.nlu_classifier(body.current_thread.text).tags,
.name == "invoice" and .confidence in ("medium", "high")
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "urgency"
)
and any(ml.nlu_classifier(body.current_thread.text).entities,
.name == "request"
)
)
)
and (
// display name contains confusables (brand impersonation)
sender.display_name != strings.replace_confusables(sender.display_name)
// or HR/recruitment/employment/internal service impersonation
or regex.icontains(sender.display_name,
'\bhr\b|human resources|staffing|recruiting|recruitment|employment|payroll|it support|help ?desk|admin|administrator'
)
)
attack_types:
- "BEC/Fraud"
- "Credential Phishing"
tactics_and_techniques:
- "Impersonation: Brand"
- "Impersonation: Employee"
- "Social engineering"
detection_methods:
- "Natural Language Understanding"
- "Content analysis"
- "Sender analysis"
id: "6538c600-06a5-5a2e-ab76-8dd7f77b2fa3"