EXPLORE
← Back to Explore
sublimehighRule

Brand impersonation: LastPass

Detects messages impersonating the password manager LastPass that contain suspicious language about maintenance, vault exports, or master passwords.

MITRE ATT&CK

initial-access

Detection Query

type.inbound
and length(body.links) > 0
and any([sender.display_name, sender.email.domain.domain],
        strings.ilike(strings.replace_confusables(.), "*LastPass*", "Last?Pass")
)
and (
  strings.ilike(body.current_thread.text,
                "*back*up*",
                "*maintenance*",
                "*master*password*",
                "*export*vault*",
                "*support@lastpass.com*" // real LastPass support address
  )
  or any(body.links,
         // links directly to a S3 bucket
         (
           .href_url.domain.root_domain == "amazonaws.com"
           and strings.icontains(.href_url.domain.subdomain, "s3")
         )
         // recipient email as a URL param
         or any(.href_url.query_params_decoded["email"],
                strings.parse_email(.).email in map(recipients.to, .email.email)
         )
  )
  or any(ml.nlu_classifier(body.current_thread.text).topics,
         .name in ("Security and Authentication", "Reminders and Notifications")
         and .confidence != "low"
  )
  // invalid sender address
  or not sender.email.domain.valid
)
// negate newsletters
and not any(ml.nlu_classifier(body.current_thread.text).topics,
            .name in ("Newsletters and Digests") and .confidence != "low"
)
and not (
  sender.email.domain.root_domain in~ ("lastpass.com")
  and headers.auth_summary.dmarc.pass
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Brand impersonation: LastPass"
description: "Detects messages impersonating the password manager LastPass that contain suspicious language about maintenance, vault exports, or master passwords."
type: "rule"
severity: "high"
source: |
  type.inbound
  and length(body.links) > 0
  and any([sender.display_name, sender.email.domain.domain],
          strings.ilike(strings.replace_confusables(.), "*LastPass*", "Last?Pass")
  )
  and (
    strings.ilike(body.current_thread.text,
                  "*back*up*",
                  "*maintenance*",
                  "*master*password*",
                  "*export*vault*",
                  "*support@lastpass.com*" // real LastPass support address
    )
    or any(body.links,
           // links directly to a S3 bucket
           (
             .href_url.domain.root_domain == "amazonaws.com"
             and strings.icontains(.href_url.domain.subdomain, "s3")
           )
           // recipient email as a URL param
           or any(.href_url.query_params_decoded["email"],
                  strings.parse_email(.).email in map(recipients.to, .email.email)
           )
    )
    or any(ml.nlu_classifier(body.current_thread.text).topics,
           .name in ("Security and Authentication", "Reminders and Notifications")
           and .confidence != "low"
    )
    // invalid sender address
    or not sender.email.domain.valid
  )
  // negate newsletters
  and not any(ml.nlu_classifier(body.current_thread.text).topics,
              .name in ("Newsletters and Digests") and .confidence != "low"
  )
  and not (
    sender.email.domain.root_domain in~ ("lastpass.com")
    and headers.auth_summary.dmarc.pass
  )
attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Social engineering"
detection_methods:
  - "Content analysis"
  - "Natural Language Understanding"
  - "Sender analysis"
  - "URL analysis"
  - "Header analysis"
id: "99831d35-1be6-547c-993e-6e6997b565bd"