← Back to Explore
sublimehighRule
Fake request for tax preparation
Unknown sender requesting assistance with tax preparation. This is associated with known threat actor activity, TA576.
Detection Query
type.inbound
and length(body.current_thread.text) < 1250
and any(beta.ml_topic(body.current_thread.text).topics,
.name == "Financial Communications"
)
// there are no links, all the links are to aka.ms, or an extraction from a warning banner that match the senders domain
and (
length(body.links) == 0
or length(filter(body.links,
(
.display_text is null
and .display_url.url == sender.email.domain.root_domain
)
or .href_url.domain.domain == "aka.ms"
or network.whois(.display_url.domain).days_old < 30
)
) == length(body.links)
)
and length(attachments) == 0
and (strings.ilike(subject.subject, "*tax*") or length(subject.subject) < 15)
and strings.icontains(body.current_thread.text, "tax")
and (
strings.like(body.current_thread.text,
"*return*",
"*record*",
"*CPA*",
"*filing*",
"*extension*"
)
or strings.ilike(body.current_thread.text,
"*tax preparer*",
"*tax*processing*"
)
)
and (
strings.ilike(body.current_thread.text,
"*necessary documents*",
"*required documents*",
"*paperwork*",
"*in search of*",
"*tax service*",
"*professional help*",
"*prepare*tax return*",
"*service*tax return*",
"*seeking*tax preparer*",
"*assist*processing*tax*",
"*schedule*call*",
"*zoom meeting*",
"*discuss*fees*",
"*W2*",
"*CPA*"
)
// suspicious patterns
or (
strings.icontains(body.current_thread.text, sender.display_name)
and 2 of (
(
length(headers.reply_to) > 0
and all(headers.reply_to,
.email.domain.root_domain != sender.email.domain.root_domain
)
),
(
headers.return_path.email is not null
and headers.return_path.email != sender.email.email
),
headers.return_path.domain.root_domain in ("amazonses.com")
)
)
)
and (
(
profile.by_sender().prevalence in ("new", "outlier")
and not profile.by_sender().solicited
)
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_messages_benign
)
)
and not profile.by_sender().any_messages_benign
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Raw Content
name: "Fake request for tax preparation"
description: "Unknown sender requesting assistance with tax preparation. This is associated with known threat actor activity, TA576."
type: "rule"
severity: "high"
source: |
type.inbound
and length(body.current_thread.text) < 1250
and any(beta.ml_topic(body.current_thread.text).topics,
.name == "Financial Communications"
)
// there are no links, all the links are to aka.ms, or an extraction from a warning banner that match the senders domain
and (
length(body.links) == 0
or length(filter(body.links,
(
.display_text is null
and .display_url.url == sender.email.domain.root_domain
)
or .href_url.domain.domain == "aka.ms"
or network.whois(.display_url.domain).days_old < 30
)
) == length(body.links)
)
and length(attachments) == 0
and (strings.ilike(subject.subject, "*tax*") or length(subject.subject) < 15)
and strings.icontains(body.current_thread.text, "tax")
and (
strings.like(body.current_thread.text,
"*return*",
"*record*",
"*CPA*",
"*filing*",
"*extension*"
)
or strings.ilike(body.current_thread.text,
"*tax preparer*",
"*tax*processing*"
)
)
and (
strings.ilike(body.current_thread.text,
"*necessary documents*",
"*required documents*",
"*paperwork*",
"*in search of*",
"*tax service*",
"*professional help*",
"*prepare*tax return*",
"*service*tax return*",
"*seeking*tax preparer*",
"*assist*processing*tax*",
"*schedule*call*",
"*zoom meeting*",
"*discuss*fees*",
"*W2*",
"*CPA*"
)
// suspicious patterns
or (
strings.icontains(body.current_thread.text, sender.display_name)
and 2 of (
(
length(headers.reply_to) > 0
and all(headers.reply_to,
.email.domain.root_domain != sender.email.domain.root_domain
)
),
(
headers.return_path.email is not null
and headers.return_path.email != sender.email.email
),
headers.return_path.domain.root_domain in ("amazonses.com")
)
)
)
and (
(
profile.by_sender().prevalence in ("new", "outlier")
and not profile.by_sender().solicited
)
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_messages_benign
)
)
and not profile.by_sender().any_messages_benign
attack_types:
- "BEC/Fraud"
- "Malware/Ransomware"
tactics_and_techniques:
- "Social engineering"
detection_methods:
- "Content analysis"
- "Natural Language Understanding"
- "Sender analysis"
id: "e36b85b3-ffc6-5d73-b865-7dbdf9b4b1a0"