EXPLORE
← Back to Explore
sublimehighRule

Brand impersonation: Bank of America

Impersonation of Bank of America, usually for credential theft.

Detection Query

type.inbound
and (
  sender.display_name =~ 'bank of america'
  or strings.ilevenshtein(sender.display_name, 'bank of america') <= 2
  or strings.ilike(sender.email.domain.domain, '*bankofamerica*')
)
and sender.email.domain.root_domain not in~ (
  'bankofamerica.com',
  'transunion.com',
  'bofa.com',
  'bofamerchantservices.com'
)
and (
  sender.email.email not in $recipient_emails
  or (
    length(recipients.to) == 1
    and sender.email.email == recipients.to[0].email.email
  )
)

// negate highly trusted sender domains unless they fail DMARC authentication
and (
  (
    sender.email.domain.root_domain in $high_trust_sender_root_domains
    and not headers.auth_summary.dmarc.pass
  )
  or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Brand impersonation: Bank of America"
description: |
  Impersonation of Bank of America, usually for credential theft.
references:
  - "https://www.techrepublic.com/article/credential-phishing-attack-impersonates-bank-of-america/"
type: "rule"
severity: "high"
source: |
  type.inbound
  and (
    sender.display_name =~ 'bank of america'
    or strings.ilevenshtein(sender.display_name, 'bank of america') <= 2
    or strings.ilike(sender.email.domain.domain, '*bankofamerica*')
  )
  and sender.email.domain.root_domain not in~ (
    'bankofamerica.com',
    'transunion.com',
    'bofa.com',
    'bofamerchantservices.com'
  )
  and (
    sender.email.email not in $recipient_emails
    or (
      length(recipients.to) == 1
      and sender.email.email == recipients.to[0].email.email
    )
  )
  
  // negate highly trusted sender domains unless they fail DMARC authentication
  and (
    (
      sender.email.domain.root_domain in $high_trust_sender_root_domains
      and not headers.auth_summary.dmarc.pass
    )
    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
  )
attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Lookalike domain"
  - "Social engineering"
detection_methods:
  - "Header analysis"
  - "Sender analysis"
id: "d2fc6ea1-0c8d-57e0-bcaa-732a2e6b76e4"