Description

Attack impersonating DocSend.

Sublime Security
Created Sep 11th, 2024 • Last updated Sep 11th, 2024
Source
type.inbound
and (
  sender.display_name =~ 'DocSend'
  or strings.ilevenshtein(sender.display_name, 'DocSend') <= 1
  or strings.icontains(sender.email.domain.domain, '*docsend*')
)
and sender.email.domain.root_domain not in~ ('docsend.com')
and sender.email.email not in $recipient_emails

// negate highly trusted sender domains unless they fail DMARC authentication
and (
  (
    sender.email.domain.root_domain in $high_trust_sender_root_domains
    and not headers.auth_summary.dmarc.pass
  )
  or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.