EXPLORE

EXPLORE DETECTIONS

🔍
986 detections found

Brand impersonation: Hulu

Impersonation of Hulu.

T1566T1566.001T1566.002T1598T1598.003+1
Sublimemedium

Brand impersonation: Interac

Impersonation of the Canadian interbanking network Interac. Seen in the wild impersonating carbon tax rebates and tax return refunds.

T1566.002T1534T1656T1598.003T1583.001+2
Sublimemedium

Brand impersonation: Internal Revenue Service

Detects messages from senders posing as the Internal Revenue Service by checking display name similarity and content indicators from body text and screenshots. Excludes legitimate IRS domains and authenticated senders.

T1566.002T1534T1656T1566T1566.001+2
Sublimehigh

Brand impersonation: KnowBe4

Impersonation of KnowBe4.

T1566T1566.001T1566.002T1598T1598.003+1
Sublimemedium

Brand impersonation: LastPass

Detects messages impersonating the password manager LastPass that contain suspicious language about maintenance, vault exports, or master passwords.

T1566T1566.001T1566.002T1598T1598.003
Sublimehigh

Brand impersonation: Ledger

Attack impersonating hardware cryptocurrency wallet ledger.com's brand.

T1566T1566.001T1566.002T1598T1598.003+1
Sublimelow

Brand impersonation: LinkedIn

Impersonation of LinkedIn.

T1566T1566.001T1566.002T1598T1598.003+1
Sublimemedium

Brand impersonation: Mailchimp

Detects messages from senders impersonating Mailchimp through display name spoofing or brand logo usage, combined with security-themed content and suspicious authentication patterns.

T1566T1566.001T1566.002T1598T1598.003
Sublimemedium

Brand impersonation: Mailgun

Impersonation of the Mailgun Email delivery platform.

T1566T1566.001T1566.002T1598T1534+2
Sublimemedium

Brand impersonation: Marriott with gift language

Detects messages impersonating Marriott brand that contain gift-related language such as 'appreciation gift', 'thank you gift', or 'something special' from senders not associated with legitimate Marriott domains.

T1566T1566.001T1566.002T1598T1598.003
Sublimemedium

Brand impersonation: McAfee

Detects messages impersonating McAfee through display name, subject line, body content, or NLU entity detection when the sender is not from verified McAfee domains or other high-trust domains with valid DMARC authentication.

T1566T1566.001T1566.002T1598T1534+3
Sublimemedium

Brand impersonation: Meta and subsidiaries

Impersonation of Meta or Meta's subsidiaries Facebook and Instagram.

T1566T1566.001T1566.002T1598T1598.003+1
Sublimemedium

Brand impersonation: MetaMask

Detects inbound messages containing links where the sender impersonates MetaMask through display name manipulation and includes the MetaMask logo or suspicious language, while not being from legitimate MetaMask domains. The rule checks for credential theft patterns and validates sender authentication.

T1566.002T1534T1656T1566T1566.001+2
Sublimehigh

Brand impersonation: Microsoft

Impersonation of the Microsoft brand.

T1566T1566.001T1566.002T1598T1598.003
Sublimehigh

Brand impersonation: Microsoft (QR code)

Detects messages using Microsoft image based lures, referencing or including a QR code from an Unsolicited sender. These messages often lead users to phishing sites or initiate unwanted downloads.

T1566T1566.001T1566.002T1598T1598.003
Sublimehigh

Brand impersonation: Microsoft fake sign-in alert

Detects messages impersonating Microsoft that mimic sign-in security alerts and attempt to solicit a response.

T1566T1566.001T1566.002T1598T1598.003
Sublimemedium

Brand impersonation: Microsoft logo in HTML with fake quarantine release notification

A message containing a Microsoft logo generated using HTML tables and references to the Microsoft Exchange quarantine, but did not come from Microsoft.

T1566T1566.001T1566.002T1598T1036+2
Sublimehigh

Brand impersonation: Microsoft logo or suspicious language with open redirect

Message contains a Microsoft logo or suspicious terms and use of an open redirect. This has been exploited in the wild to impersonate Microsoft.

T1566.002T1534T1656T1598.003T1566+1
Sublimehigh

Brand impersonation: Microsoft Planner with suspicious link

Impersonation of Microsoft Planner, a component of the Microsoft 365 software suite.

T1566T1566.001T1566.002T1598T1036+2
Sublimemedium

Brand impersonation: Microsoft quarantine release notification in body

Message containing suspicious quarantine release language in the body, and a Microsoft logo attachment but did not come from Microsoft.

T1566T1566.001T1566.002T1598T1598.003
Sublimehigh

Brand impersonation: Microsoft quarantine release notification in image attachment

Message with an image attachment containing credential theft language and references to the Microsoft Exchange quarantine, but did not come from Microsoft.

T1566T1566.001T1566.002T1598T1598.003
Sublimehigh

Brand impersonation: Microsoft Teams

Impersonation of a Microsoft Teams message.

T1566T1566.001T1566.002T1598T1598.003
Sublimehigh

Brand impersonation: Microsoft Teams invitation

Detects messages impersonating a Microsoft Teams invites by matching known invite text patterns while containing join links that do not resolve to Microsoft domains. Additional verification includes checking for absent phone dial-in options and missing standard Teams help text or HTML meeting components.

T1566T1566.001T1566.002T1598T1598.003
Sublimehigh

Brand impersonation: Microsoft with embedded logo and credential theft language

This rule detects messages impersonating Microsoft via a logo and contains credential theft language. From a new and unsolicited sender.

T1566T1566.001T1566.002T1598T1598.003
Sublimehigh
PreviousPage 13 of 42Next