← Back to Explore
sublimemediumRule
Brand impersonation: Okta
Impersonation of Okta, an identity and access management company.
Detection Query
type.inbound
and (
regex.icontains(sender.display_name, '\bOkta\b')
or strings.ilike(sender.email.domain.domain, '*Okta*')
or strings.ilike(subject.subject, '*Okta*')
)
and not (
length(headers.references) > 0
or any(headers.hops, any(.fields, strings.ilike(.name, "In-Reply-To")))
)
and not (
sender.email.domain.root_domain in~ (
'oktacdn.com',
'okta.com',
'okta-emea.com',
'okta-gov.com',
'oktapreview.com',
'polaris.me',
'examity.com' // exam service used by okta
)
and headers.auth_summary.dmarc.pass
)
and any(ml.logo_detect(file.message_screenshot()).brands,
.name == "Okta" and .confidence in ("medium", "high")
)
and (
profile.by_sender().prevalence in ("new", "outlier")
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_messages_benign
)
)
// negate okta relay
and not any(distinct(headers.domains, .domain is not null),
.domain == "mailrelay.okta.com"
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and not headers.auth_summary.dmarc.pass
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Raw Content
name: "Brand impersonation: Okta"
description: "Impersonation of Okta, an identity and access management company."
type: "rule"
severity: "medium"
source: |
type.inbound
and (
regex.icontains(sender.display_name, '\bOkta\b')
or strings.ilike(sender.email.domain.domain, '*Okta*')
or strings.ilike(subject.subject, '*Okta*')
)
and not (
length(headers.references) > 0
or any(headers.hops, any(.fields, strings.ilike(.name, "In-Reply-To")))
)
and not (
sender.email.domain.root_domain in~ (
'oktacdn.com',
'okta.com',
'okta-emea.com',
'okta-gov.com',
'oktapreview.com',
'polaris.me',
'examity.com' // exam service used by okta
)
and headers.auth_summary.dmarc.pass
)
and any(ml.logo_detect(file.message_screenshot()).brands,
.name == "Okta" and .confidence in ("medium", "high")
)
and (
profile.by_sender().prevalence in ("new", "outlier")
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_messages_benign
)
)
// negate okta relay
and not any(distinct(headers.domains, .domain is not null),
.domain == "mailrelay.okta.com"
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and not headers.auth_summary.dmarc.pass
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Impersonation: Brand"
- "Lookalike domain"
- "Social engineering"
detection_methods:
- "Computer Vision"
- "Content analysis"
- "Header analysis"
- "Sender analysis"
id: "b7a2989a-a5ef-5340-b1d0-6b7c51462855"