Phishing Scenario Rule Conditions

This topic describes the conditions that you can use to create rules and the default rules provided for the following phishing scenarios:

For example, you can create a rule that will trigger alerts for only certain use cases, i.e. less alerts will be triggered than with the Threat Command Phishing Domain default-enabled rule. For more details, see Phishing domain Alert Profiler example.

Phishing domains

Phishing domains - Conditions

The following table describes the conditions that you can use to create rules.

When using a regular expression, don't enclose the expression in quotation marks.

FeatureOperatorValuesDescription
Detection algorithmidentified/did not identifya Phishing DomainDid the Threat Command internal Phishing Domain detection algorithm identify a phishing domain?
A recordcontains/does not contain"Regex"Does the domain's "A" record contain a pattern (can be expressed as a regular expression)?
Asset namein/not inSelect assetsDoes the brand name, company name, or domain name contain selected assets?
Asset permutationin/not in"Homoglyph"Does the domain name contain a look-alike character permutation of a company asset?
Asset tagsin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
Characters in domain name=, !=, >=, <=, >, <Type a number of charactersDoes the domain name (without TLD) contain a specific amount of characters?
Asset permutationin/not in"Translation"Does the domain name contain non-ASCII characters?
Domaincontains/does not contain"A record"Does the domain have a DNS A record?
Domaincontains/does not contain"Meaningless website"Is the website behind the domain meaningless:
Is the domain…- under construction?- offering a domain for sale?- returning a server error?- Blank?
Does the website…- contain an iframe to the registrar domain?- link to a domain hosting provider?- return an error?- Is the website related to a parked domains provider?
Domaincontains/does not contain"MX record"Does the domain have a DNS MX record?
Domaincontains/does not contain"NS record"Does the domain have a DNS NS record?
Domainis/is not"Existing"Does the domain exist?
Domainis/is not"Expired"Is the domain expired? If there is no expiry date, it is assumed that the domain is not expired.
Domain days since domain registration=, !=, >=, <=, >, <Type a number of days since registrationHow many days ago was this domain registered? Use an integer number greater than 0.

If there is no WHOIS information available, the domain is assumed to have been registered one day before the domain was found.
Domain namecontains/does not contain"Company asset"Does the domain name contain a company asset?
Domain namecontains/does not contain"Regex"Does the domain name contain a pattern (can be expressed as a regular expression)? You can use theExclude Domainfeature to exclude a single domain.
Domain Registrantin/not inType a list of registrants, with regexIs the domain registrant listed in a specific list? For each list item, you can use a regular expression. List items should be separated with a semicolon.
Domain Registrantis/is not"Trusted"Is the domain registrant trusted (based on an internal list of registrants who are considered trusted)?
Domain Registrarin/not inType a list of registrars, with regexIs the domain registrar listed in a specific list? For each list item, you can use a regular expression. List items should be separated with a semicolon.
Domain TLDis/is not"Same as asset TLD"Does the domain have the same TLD as a company domain?
Domain typeis/is not"Domain"/"Subdomain"Is the domain a domain or is it a subdomain?
Domain typeis/is not"Domain"/"Sub-domain"Is the domain a domain or a subdomain?
Domain WHOIS recordcontains/does not contain"Regex"Does the domain's WHOIS record contain a pattern (can be expressed as a regular expression)?
MX recordcontains/does not contain"Regex"Does the domain's "MX" record contain a pattern (can be expressed as a regualr expression)?
NS recordcontains/does not contain"Regex"Does the domain's "NS" record contain a pattern (can be expressed as a regualr expression)?
Subdomain nameIs/is not"Company domain"Is the subdomain name exactly the same as the company domain with its top-level domain?
Subdomain nameIs/is not"Company name or Brand name"Is the subdomain name exactly the same as the company name or brand name?
Websitecontains/does not contain"Login form"Does the website contain a login form with an input field for password?
Websiteis/is not"Redirecting elsewhere"Does the website redirect to another website?
Website contentcontains/does not contain"Company domain"Does the website contain your company domain?
Website contentcontains/does not contain"Company emails related to my domain"Does the website contain email addresses that are related to your company domain?
Website contentcontains/does not containCompany logoDoes the website contain a company logo?
Website contentcontains/does not contain"Company name or Brand names"Does the website contain your company or brand names?
Website contentcontains/does not contain“Regex list”Does the website contain a pattern (can be expressed as a regular expression)?

Phishing domains - rules

The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Phishing Domain - Default Detection RuleDomain detected as a phishing domain by the internal Threat Command detection algorithmEnabled
Suspected Phishing domain recently registered - Default Detection RuleDomain detected as a phishing domain by the internal Threat Command detection algorithm 
AND 
Domain was registered less than 7 days ago
Disabled
Suspected Phishing domain with login form - Default Detection RuleDomain detected as a phishing domain by the internal Threat Command detection algorithm 
AND 
Website contains a login form
Disabled
Suspected Phishing domain with MX record - Default Detection RuleDomain detected as a phishing domain by the internal Threat Command detection algorithm 
AND 
Domain contains an MX record
Enabled

Phishing domain Alert Profiler example

An example of how to use the Alert Profiler for phishing domains could be to trigger alerts only for certain use cases. Also see the Best Practices for Phishing Domain Detection.

The following illustration shows how you can add conditions to the Threat Command Phishing Domain default rule to make alert triggering more selective. Alerts will be elevated only if they have a login page AND if the website content contains a specific regex list (“intsights” or “int-sights”): temporary placeholder

Phishing websites

Phishing Websites - conditions

The following table describes the conditions that you can use to create rules.

When using a regular expression, don't enclose the expression in quotation marks.

FeaturesOperatorValuesDescription
Detection algorithmidentified/
did not identify
"A phishing website"Did the Threat Command internal detection algorithm identify a phishing website?
Asset namein/not inSelect assetsDoes the brand name, company name, or domain name contain specific assets?
Asset tagsin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
Domain days since registration=, !=, >=, <=, >, <User will type # of days since registrationHow many days ago was this domain registered? Use any integer number between 0 and 1000 days.
Websitecontains/does not contain"Login form"Does the website contain a login form with an input field for password?
Websiteis/is not"Active"Is the website active?
Website contentcontains/does not contain"Brand name or Company name"Does the website content contain a "Brand name" or "Company name" asset?
Website contentcontains/does not containCompany logoDoes the website content contain a company logo?
Website contentcontains/does not contain"Regex list"Does the website content contain a specific pattern (can be expressed as a regular expression)?
Website titlecontains/does not contain"Brand name or Company name"Does the website title contain a "Brand name" or "Company name" asset?
Website URLcontains/does not contain"Brand name or Company name"Does the website URL contain a "Brand name" or "Company name" asset?
Webite URLcontains/does not contain"Regex list"Does the website URL contain a specific pattern (can be expressed as a regular expression)?
Website URLis/is not"Listed on Google Web Risk"Is the website URL included on a Google Web Risk list?

Phishing Websites - rules

The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Phishing Websites - Default Detection RuleA phishing website was detected by the internal Threat Command detection algorithmEnabled

Phishing websites Alert Profiler examples

These examples show how to use the Alert Profiler for phishing website threats.

Problem : The customer has a brand that is frequently targeted by phishing and other brands that are less targeted.

Solution : Add a condition (to the Detection algorithm) that alerts only on websites containing the targeted asset.

temporary placeholder

Customize alert triggering with the Alert profiler :

  1. Edit the default rule, and change the "any " to "all."
  2. Add the Asset name condition.
  3. Add the parameters to select the targeted asset.

Problem : The customer is primarily targeted by phishing websites with a similar pattern (such as usage of certain hosting providers).

Solution : Add a condition (to the Detection algorithm) that alerts only on URLs (for example) that contain a certain pattern (defined by a Regex). temporary placeholderSteps :

  1. Edit the default rule, and change the "any " to "all."
  2. Add the Website URL condition.
  3. Add the parameters to define a Regex that will catch the troublesome hosts.

Phishing Watch

Phishing Watch - conditions

The following table describes the conditions that you can use to create rules.

When using a regular expression, don't enclose the expression in quotation marks.

FeatureOperatorValueDescription
Phishing Watch - Default Detection RuleIdentified or did not identify“A suspicious clone”Did the Threat Command internal Phishing Watch detection algorithm identify a suspicious cloned website?
Phishing Watch - Default Detection RuleIdentified or did not identify“A suspicious iframe”Did the Threat Command internal Phishing Watch detection algorithm identify a suspicious iframe?
Phishing Watch - Default Detection RuleIdentified or did not identify“A suspicious redirect”Did the Threat Command internal Phishing Watch detection algorithm identify a suspicious redirect?

For example, if the presence of an iframe should NOT trigger an alert, you can remove the ‘suspicious iframe’ condition, and keep the other conditions.

In addition, you can use any of the following conditions:

FeatureOperatorValueDescription
Domain days since registration=, !=, >=, <=, >, <User will type # of days since registrationHow many days ago was this domain registered? Use any integer number between 0 and 1000 days.
Phishing WatchIdentified or

did not identify
"A cloned website"Did the Phishing Watch identify a cloned website?
Phishing WatchIdentified or

did not identify
"A website redirection"Did the Phishing Watch identify a redirection to a company website?
Phishing WatchIdentified or

did not identify
"An iframe"Did the Phishing Watch identify an iframe?
Report originIs or is not"A local endpoint"Is the report origin a local endpoint?
Report originIs or is not"A public IP address"Is the report origin a public IP address?
WebsiteIs or is not"Active"Is the website active?
WebsiteContains or does not contain"Login form"Does the website contain a login form with an input field for passwords?
Website contentContains or does not contain"Brand name or Company name"Does the website content contain a "Brand names" or "Company names" asset?
Website titleContains or does not contain"Brand name or Company name"Does the website title contain a "Brand names" or "Company names" asset?
Website URLContains or does not contain"Brand name or Company name"Does the website URL contain a "Brand names" or "Company names" asset?
Website URLContains or does not contain"Regex list"Does the website URL contain a specific pattern (can be expressed as a regular expression)?
Website URLIs or is not"Listed on Google Web Risk"Is the website URL included on a Google Web Risk list?

Phishing Watch - rules

The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Phishing Watch - Default Detection RuleA suspicious cloned website, redirect, or iframe was detected by the internal Threat Command detection algorithmEnabled

Best Practices for Phishing Domain Detection

Best-practice suggestions for using the Alert Profiler for phishing domain detection.

You can use the Alert Profiler to achieve the following:

  • Reduce the number of phishing alerts and phishing false-positive alerts.
  • Set a tailored severity calculation to phishing alerts.

Reduce the number of phishing alerts

The default Detection Algorithm looks for either of these matches, based on the Brand names, Company names, and Domains assets:

  • The domain name is a permutation of any of these assets.
  • The domain HTML content contains those exact assets.

Certain assets may create excess phishing alerts as well as many false-positive alerts. The first step in reducing the number of alerts is to review the Brand names, Company names, and Domains assets. If an asset is deemed to be “noisy,” you can exclude it from being detected.

To exclude assets from detection:

You can exclude noisy assets from triggering alerts by adding a condition to exclude that asset, on every existing or new rule.

In this example, the domain names “acme.one”, “insights3.com” and “intsights-demo.com” will be excluded:

temporary placeholder

Set a tailored severity calculation to Phishing alerts

Another way to enhance alert management is by tailoring the severity (Low, Medium, or High) assigned to triggered alerts. In addition to getting clearer classification, at the same time, you can prevent alert generation for threats that are less than your severity criteria.

The suggestions we present are just that - suggestions. You can use them as-is, modify them for your needs, or ignore them. Note that every rule includes the default Detection Algorithm, and triggers alerts only if they match that rule AND the added criteria. Low Severity The rule consists of two parts. A low-severity alert will be triggered if "all" conditions of either part (using an "any" condition) pass. Anything that does not match, minimally, will not generate an alert.

temporary placeholder

  • Part A
    The default Detection algorithm [matches domains whose only connection is their name (a permutation of the asset) or their content (an exact match)] AND the domain is either expired (which indicates an opportunity to purchase the domain).

  • Part B
    The default Detection algorithm [matches domains whose only connection is their name (a permutation of the asset) or their content (an exact match)] AND the domain is in a very basic stage of a possible phishing campaign.

Medium Severity A medium-severity alert will be triggered if a domain matches the default Detection algorithm [matches domains whose only connection is their name (a permutation of the asset) or their content (an exact match)] AND the domain is unexpired AND the domain is in a more mature stage of a possible phishing campaign.

temporary placeholder

High Severity A high-severity alert will be triggered if a domain matches the default Detection algorithm [matches domains whose only connection is their name (a permutation of the asset) or their content (an exact match)] AND the domain is expired AND it contains a login form. This indicates a live website that is possibly trying to phish company clients and employees. temporary placeholderOther common conditions

The previous suggestions can be enhanced and modified by adding other conditions. Here are some examples to consider:

  • Identify domain parking:

temporary placeholder

  • Identify domain names with sector-related words (e.g. Banking):

temporary placeholder

  • Identify domain names with common misleading permutations (polymorphic phishing). For example, "lntsights" (with a lower “L” instead of the 1st “I”) or "Intslghts" (with a lower “L” instead of the 2nd “I”):

temporary placeholder

Using Regex expressions

Many of the conditions enable the use of regex (Regular Expression) terms. This is a very popular and powerful way to define more exact searches.

For example, a company named "ION" would falsely match these names "international," "nation," and "ionic"

Using the following regex search, you can ensure that only matches for "ion" are matched:

  • ^ finds only expressions that start exactly this way.
  • $ finds only expressions that end exactly this way.

The previous example, as represented on https://regex101.com/: temporary placeholder We recommend using any of the regex reference sites on the Web to learn more about regex.