EXPLORE
← Back to Explore
sublimemediumRule

Brand impersonation: ADP

Impersonation of the payroll provider ADP. Most commonly seen around US tax season (Q1)

MITRE ATT&CK

initial-access

Detection Query

type.inbound
and sender.display_name in~ (
  'RS-Plan-Admin@adp.com',
  'ADP',
  'SecurityServices_NoReply@adp.com'
)
and sender.email.domain.root_domain not in~ (
  'adp.com',
  'adpsurveys.com',
  'adp.com.br'
)
and sender.email.email not in $recipient_emails

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Brand impersonation: ADP"
description: |
  Impersonation of the payroll provider ADP. Most commonly seen around US tax season (Q1)
references:
  - "https://www.align.com/blog/tax-related-phishing-scam-targets-adp-users"
type: "rule"
severity: "medium"
source: |
  type.inbound
  and sender.display_name in~ (
    'RS-Plan-Admin@adp.com',
    'ADP',
    'SecurityServices_NoReply@adp.com'
  )
  and sender.email.domain.root_domain not in~ (
    'adp.com',
    'adpsurveys.com',
    'adp.com.br'
  )
  and sender.email.email not in $recipient_emails
attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Social engineering"
detection_methods:
  - "Header analysis"
  - "Sender analysis"
id: "bb9cf46b-188e-58f5-996e-b35caf2423a2"