Added new rule for detecting rating solicitation scams#4492
Added new rule for detecting rating solicitation scams#4492jacob-mazurkiewicz wants to merge 2 commits into
Conversation
Test Rules Sync - Action RequiredThis PR was not automatically synced to test-rules because the author is not a member of the To enable syncing, an organization member can comment Once triggered, the rules will be synced on the next scheduled run (every 10 minutes). |
IndiaAce
left a comment
There was a problem hiding this comment.
Hey Jacob thanks for your contribution!
I think this is a clever idea to provide coverage for these scams. Early telemetry looks okay, however I have a few suggestions (left below). Also, I'm curious to hear your thoughts on reinforcing the "scam" nature of these two examples you provided. I see some arrant false positives on some document sharing messages that are requests to view documents/proposals and leave feedback. They are no doubt malicious, but outside of the scope of this rule. I'm curious to see what the nlu classifier gives as a .topic for both of your samples? Perhaps the "giveaway" angle is something worth pursuing?
Keeping your .intent use for both current and previous threads, but adding another "and" stanza with something like
and any(ml.nlu_classifier(body.current_thread.text).topics, .name == "Advertising and Promotions" )
I also see some patterns (with some samples I found as well) where each of these seem to provide "instructions" to the user, notice your two samples contain that set of 4 instructions. That might be an angle worth pursuing.
Let me know your thoughts!
| ( | ||
| // scam in current thread | ||
| any(ml.nlu_classifier(body.current_thread.text).intents, | ||
| .name in ("scam", "job_scam", "cred_theft") and .confidence != "low" |
There was a problem hiding this comment.
| .name in ("scam", "job_scam", "cred_theft") and .confidence != "low" | |
| .name in ("job_scam", "cred_theft") and .confidence != "low" |
"scam" is an invalid enumerator for our nlu_classifier, cred_theft and job_scam should grant us all the coverage you need here... you might consider "callback_scam" as well if you've seen samples!
| // negating legitimate employer review/rating senders | ||
| and not ( | ||
| sender.email.domain.root_domain in ( | ||
| 'glassdoor.com', | ||
| 'indeed.com', | ||
| 'comparably.com', | ||
| 'greatplacetowork.com', | ||
| 'builtin.com', | ||
| 'linkedin.com', | ||
| 'lensa.com', | ||
| 'ziprecruiter.com', | ||
| 'kununu.com', | ||
| 'jobcase.com', | ||
| 'trustpilot.com' | ||
| ) | ||
| and headers.auth_summary.dmarc.pass | ||
| ) |
There was a problem hiding this comment.
| // negating legitimate employer review/rating senders | |
| and not ( | |
| sender.email.domain.root_domain in ( | |
| 'glassdoor.com', | |
| 'indeed.com', | |
| 'comparably.com', | |
| 'greatplacetowork.com', | |
| 'builtin.com', | |
| 'linkedin.com', | |
| 'lensa.com', | |
| 'ziprecruiter.com', | |
| 'kununu.com', | |
| 'jobcase.com', | |
| 'trustpilot.com' | |
| ) | |
| and headers.auth_summary.dmarc.pass | |
| ) | |
| // negating legitimate employer review/rating senders | |
| and not ( | |
| ( | |
| sender.email.domain.root_domain in ( | |
| 'comparably.com', | |
| 'greatplacetowork.com', | |
| 'builtin.com', | |
| 'lensa.com', | |
| 'ziprecruiter.com', | |
| 'kununu.com', | |
| 'jobcase.com', | |
| 'trustpilot.com' | |
| ) | |
| or sender.email.domain.root_domain in $high_trust_sender_root_domains | |
| ) | |
| and coalesce(headers.auth_summary.dmarc.pass, false) | |
| ) |
A few of these domains are found in our high trust sender root domains, so I removed those and added a general check for those. Consider also strengthening the auth check to consider "null" values.
| // scam in previous thread | ||
| or any(body.previous_threads, | ||
| any(ml.nlu_classifier(.text).intents, | ||
| .name in ("scam", "job_scam", "cred_theft") |
There was a problem hiding this comment.
| .name in ("scam", "job_scam", "cred_theft") | |
| .name in ("job_scam", "cred_theft") |
Description
This new rule targets attempts for solicitation of ratings/reviews of employers. These false solicitations can contain malicious links or be attempts at phishing information or credentials from the receiver.
Associated samples
Example one:
Screenshot (insights)
Rule flagged example one

Rule flagged example two
