EXPLORE
← Back to Explore
sublimemediumRule

Service abuse: WeTransfer callback scam

Detects callback scams originating from legitimate WeTransfer noreply address using natural language processing to identify high-confidence callback scam intent in the message body.

MITRE ATT&CK

initial-access

Detection Query

type.inbound
and sender.email.email == 'noreply@wetransfer.com'
and any(ml.nlu_classifier(body.current_thread.text).intents,
        .name == "callback_scam"
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Service abuse: WeTransfer callback scam"
description: "Detects callback scams originating from legitimate WeTransfer noreply address using natural language processing to identify high-confidence callback scam intent in the message body."
type: "rule"
severity: "medium"
source: |
  type.inbound
  and sender.email.email == 'noreply@wetransfer.com'
  and any(ml.nlu_classifier(body.current_thread.text).intents,
          .name == "callback_scam"
  )
attack_types:
  - "Callback Phishing"
tactics_and_techniques:
  - "Social engineering"
  - "Out of band pivot"
detection_methods:
  - "Content analysis"
  - "Natural Language Understanding"
  - "Sender analysis"
id: "c60c8650-e76e-501b-acf8-1feeb0e45bf2"