Skip to content

Commit 2948963

Browse files
authored
Bump severities to high (#775)
1 parent ef1a7aa commit 2948963

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

detection-rules/attachment_docusign_image_suspicious_links.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: "Attachment: DocuSign image lure with no DocuSign domains in links"
22
description: "Detects DocuSign phishing emails with no DocuSign links, a DocuSign logo attached, from a first-time sender."
33
type: "rule"
4-
severity: "medium"
4+
severity: "high"
55
source: |
66
type.inbound
77
and length(filter(attachments, .file_type not in $file_types_images)) == 0

detection-rules/attachment_microsoft_image_lure_qr_code.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: "Brand impersonation: Microsoft (QR code)"
22
description: |
33
Detects messages using Microsoft image based lures, referencing or including a QR code from an Unsolicited sender. These messages often lead users to phishing sites or initiate unwanted downloads.
44
type: "rule"
5-
severity: "medium"
5+
severity: "high"
66
source: |
77
type.inbound
88
and (

detection-rules/attachment_office365_image.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: "Attachment: Office365 image (unsolicited)"
22
description: |
33
Looks for messages with an image attachment that contains words related to Microsoft, Office365, and passwords.
44
type: "rule"
5-
severity: "medium"
5+
severity: "high"
66
source: |
77
type.inbound
88
and length(filter(attachments, .file_type not in $file_types_images)) == 0

0 commit comments

Comments
 (0)