Skip to content

Commit 7674ef0

Browse files
[PR #3068] changed rule: Brand impersonation: Charter Spectrum
1 parent 9b0a1fa commit 7674ef0

File tree

1 file changed

+55
-0
lines changed

1 file changed

+55
-0
lines changed
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
name: "Brand impersonation: Charter Spectrum"
2+
description: "Detects messages impersonating Charter Spectrum by using variations of 'Spectrum' or 'MyCharter' in the display name while not originating from legitimate Charter domains or failing DMARC authentication."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
// Claim to be Charter or Spectrum in the Display Name
8+
and regex.icontains(sender.display_name, 'spe[cç]trum', 'MyCharter')
9+
// Exclude authorized sending through legitimate sending domains
10+
and not (
11+
sender.email.domain.root_domain in (
12+
"spectrumemails.com", // primary communication domain
13+
"beagleinsight.com", // survey vendor
14+
"spectrumreach.com", // direct marketing
15+
"charter.com", // service alerts
16+
"spectrumenterprise.com", // customer surveys
17+
"spectrumcustomersurvey.com", // customer feedback surveys
18+
"ccsend.com", // they use constant contact
19+
"simplifiednetworkmanagement.com", // cold emailing from this domain
20+
"tbjobalerts.com" // Job listings for Spectrum
21+
)
22+
and headers.auth_summary.dmarc.pass
23+
)
24+
// necessitated by legit emails that are failing dmarc (they probably use a vendor)
25+
and not (
26+
sender.email.domain.root_domain in (
27+
"spectrum.com", // they use vendors that don't have dmarc pass
28+
"spectrum.net" // voicemail notifications - dmarc null
29+
)
30+
and headers.auth_summary.spf.pass
31+
)
32+
33+
// Make sure this is related to Charter -- exclude other use of 'spectrum'
34+
and regex.icontains(body.current_thread.text, 'Charter')
35+
36+
// Head off other jobs emails
37+
and not (
38+
strings.icontains(body.current_thread.text, "applicant")
39+
and strings.icontains(body.current_thread.text, "apply")
40+
and strings.icontains(body.current_thread.text, "Opportunity Employer")
41+
and strings.icontains(body.current_thread.text, "Opening")
42+
)
43+
attack_types:
44+
- "Credential Phishing"
45+
tactics_and_techniques:
46+
- "Impersonation: Brand"
47+
- "Social engineering"
48+
detection_methods:
49+
- "Content analysis"
50+
- "Header analysis"
51+
- "Sender analysis"
52+
id: "26162949-d936-5dd7-a626-6f1b3ca41dff"
53+
og_id: "f1cd01e0-3f2b-52c3-9e99-66a9726763ce"
54+
testing_pr: 3068
55+
testing_sha: 2d51071437d4b73253472e36758b3e2d0484f048

0 commit comments

Comments
 (0)