← Back to Explore
sublimelowRule
Unusually long local part from untrusted sender address
Detects messages with unusually long local address parts (before the @) from senders outside trusted domains and without verified authentication.
Detection Query
// max length of the local_part for exchange is 315
// https://learn.microsoft.com/en-us/exchange/mail-flow/mail-routing/recipient-resolution?view=exchserver-2019&viewFallbackFrom=exchonline-ww
100 < length(sender.email.local_part)
// not org_domains
and not (
sender.email.domain.root_domain in $org_domains
and headers.auth_summary.dmarc.pass
)
// negate highly trusted sender domains unless they fail DMARC authentication
and not (
sender.email.domain.root_domain in $high_trust_sender_root_domains
and headers.auth_summary.dmarc.pass
)
// remove common senders, unless marked malicious
and not (
profile.by_sender_email().prevalence == "common"
and profile.by_sender_email().any_messages_malicious_or_spam == false
)
// a common observed benign cases of this due to Internet Mail Connector Encapsulated Address (IMCEA)
and not strings.istarts_with(sender.email.local_part, 'imcea')
// no previous false positives on this specific sender
and not profile.by_sender_email().any_messages_benign
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Tags
Attack surface reduction
Raw Content
name: "Unusually long local part from untrusted sender address"
description: "Detects messages with unusually long local address parts (before the @) from senders outside trusted domains and without verified authentication."
type: "rule"
severity: "low"
source: |
// max length of the local_part for exchange is 315
// https://learn.microsoft.com/en-us/exchange/mail-flow/mail-routing/recipient-resolution?view=exchserver-2019&viewFallbackFrom=exchonline-ww
100 < length(sender.email.local_part)
// not org_domains
and not (
sender.email.domain.root_domain in $org_domains
and headers.auth_summary.dmarc.pass
)
// negate highly trusted sender domains unless they fail DMARC authentication
and not (
sender.email.domain.root_domain in $high_trust_sender_root_domains
and headers.auth_summary.dmarc.pass
)
// remove common senders, unless marked malicious
and not (
profile.by_sender_email().prevalence == "common"
and profile.by_sender_email().any_messages_malicious_or_spam == false
)
// a common observed benign cases of this due to Internet Mail Connector Encapsulated Address (IMCEA)
and not strings.istarts_with(sender.email.local_part, 'imcea')
// no previous false positives on this specific sender
and not profile.by_sender_email().any_messages_benign
tags:
- "Attack surface reduction"
attack_types:
- "Credential Phishing"
- "Spam"
tactics_and_techniques:
- "Evasion"
detection_methods:
- "Header analysis"
- "Sender analysis"
id: "91a9cd45-41a9-51b9-9207-ded98d398d70"