EXPLORE
← Back to Explore
sublimemediumRule

Brand impersonation: Okta

Impersonation of Okta, an identity and access management company.

Detection Query

type.inbound
and (
  regex.icontains(sender.display_name, '\bOkta\b')
  or strings.ilike(sender.email.domain.domain, '*Okta*')
  or strings.ilike(subject.subject, '*Okta*')
)
and not (
  length(headers.references) > 0
  or any(headers.hops, any(.fields, strings.ilike(.name, "In-Reply-To")))
)
and not (
  sender.email.domain.root_domain in~ (
    'oktacdn.com',
    'okta.com',
    'okta-emea.com',
    'okta-gov.com',
    'oktapreview.com',
    'polaris.me',
    'examity.com' // exam service used by okta
  )
  and headers.auth_summary.dmarc.pass
)
and any(ml.logo_detect(file.message_screenshot()).brands,
        .name == "Okta" and .confidence in ("medium", "high")
)
and (
  profile.by_sender().prevalence in ("new", "outlier")
  or (
    profile.by_sender().any_messages_malicious_or_spam
    and not profile.by_sender().any_messages_benign
  )
)
// negate okta relay
and not any(distinct(headers.domains, .domain is not null),
            .domain == "mailrelay.okta.com"
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
  (
    sender.email.domain.root_domain in $high_trust_sender_root_domains
    and not headers.auth_summary.dmarc.pass
  )
  or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Brand impersonation: Okta"
description: "Impersonation of Okta, an identity and access management company."
type: "rule"
severity: "medium"
source: |
  type.inbound
  and (
    regex.icontains(sender.display_name, '\bOkta\b')
    or strings.ilike(sender.email.domain.domain, '*Okta*')
    or strings.ilike(subject.subject, '*Okta*')
  )
  and not (
    length(headers.references) > 0
    or any(headers.hops, any(.fields, strings.ilike(.name, "In-Reply-To")))
  )
  and not (
    sender.email.domain.root_domain in~ (
      'oktacdn.com',
      'okta.com',
      'okta-emea.com',
      'okta-gov.com',
      'oktapreview.com',
      'polaris.me',
      'examity.com' // exam service used by okta
    )
    and headers.auth_summary.dmarc.pass
  )
  and any(ml.logo_detect(file.message_screenshot()).brands,
          .name == "Okta" and .confidence in ("medium", "high")
  )
  and (
    profile.by_sender().prevalence in ("new", "outlier")
    or (
      profile.by_sender().any_messages_malicious_or_spam
      and not profile.by_sender().any_messages_benign
    )
  )
  // negate okta relay
  and not any(distinct(headers.domains, .domain is not null),
              .domain == "mailrelay.okta.com"
  )
  // negate highly trusted sender domains unless they fail DMARC authentication
  and (
    (
      sender.email.domain.root_domain in $high_trust_sender_root_domains
      and not headers.auth_summary.dmarc.pass
    )
    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
  )

attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Lookalike domain"
  - "Social engineering"
detection_methods:
  - "Computer Vision"
  - "Content analysis"
  - "Header analysis"
  - "Sender analysis"
id: "b7a2989a-a5ef-5340-b1d0-6b7c51462855"