High Severity
Attachment: DocuSign image lure with no DocuSign domains in links
Labels
Description
Detects DocuSign phishing emails with no DocuSign links, a DocuSign logo attached, from a first-time sender.
References
No references.
Sublime Security
Created Aug 17th, 2023 • Last updated Nov 27th, 2023
Feed Source
Sublime Core Feed
Source
type.inbound
and length(filter(attachments, .file_type not in $file_types_images)) == 0
and any(body.links, not strings.ilike(.href_url.domain.root_domain, "docusign.*"))
and any(attachments,
(
any(ml.logo_detect(.).brands, .name == "DocuSign" and .confidence in ("medium", "high"))
or any(file.explode(.),
strings.ilike(.scan.ocr.raw, "*DocuSign*")
and any(ml.nlu_classifier(.scan.ocr.raw).intents,
.name == "cred_theft" and .confidence != "low"
)
)
)
and any(file.explode(.),
regex.icontains(.scan.ocr.raw,
"review document",
"[^d][^o][^c][^u]sign",
"important edocs",
"completed document"
)
)
)
and (
not profile.by_sender().solicited
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_false_positives
)
)
and not profile.by_sender().any_false_positives
Playground
Test against your own EMLs or sample data.