EXPLORE
← Back to Explore
sublimelowRule

Brand impersonation: Ripple

Attack impersonating Ripple cryptocurrency, potentially in the form of a giveaway scam.

MITRE ATT&CK

initial-access

Detection Query

type.inbound
and regex.imatch(sender.display_name, '\bripple\b')
and sender.email.domain.root_domain not in ("ripple.com", "ripplejobs.co.uk")
and (
  not profile.by_sender().solicited
  or (
    profile.by_sender().any_messages_malicious_or_spam
    and not profile.by_sender().any_messages_benign
  )
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email

Tags

Cryptocurrency
Raw Content
name: "Brand impersonation: Ripple"
description: |
  Attack impersonating Ripple cryptocurrency, potentially in the form of a giveaway scam.
references:
  - "https://ripple.com/insights/how-to-spot-xrp-giveaway-scams/"
  - "https://support.gatehub.net/hc/en-us/articles/360014496899-Phishing-email-spoofs-Ripple"
type: "rule"
severity: "low"
source: |
  type.inbound
  and regex.imatch(sender.display_name, '\bripple\b')
  and sender.email.domain.root_domain not in ("ripple.com", "ripplejobs.co.uk")
  and (
    not profile.by_sender().solicited
    or (
      profile.by_sender().any_messages_malicious_or_spam
      and not profile.by_sender().any_messages_benign
    )
  )
tags:
  - "Cryptocurrency"
attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Social engineering"
detection_methods:
  - "Sender analysis"
id: "68b39736-70e0-5bf7-8a0a-3e2206552251"