Skip to content

Commit 7b4a226

Browse files
[PR #3408] added rule: Brand impersonation: SAP Concur
1 parent 5b183ad commit 7b4a226

File tree

1 file changed

+49
-0
lines changed

1 file changed

+49
-0
lines changed
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
name: "Brand impersonation: SAP Concur"
2+
description: |
3+
Detects SAP Concur brand impersonation emails claiming to be expense report
4+
notifications or approval requests. Attackers spoof concursolutions.com sender
5+
addresses and use Concur branding to trick recipients into clicking malicious
6+
links for credential theft.
7+
type: "rule"
8+
severity: "high"
9+
source: |
10+
type.inbound
11+
and (
12+
// Sender display name or domain contains Concur
13+
regex.icontains(sender.display_name, '\bconcur\b')
14+
or (
15+
strings.ilevenshtein(strings.replace_confusables(sender.display_name),
16+
'concur'
17+
) <= 1
18+
and not sender.display_name =~ "connor"
19+
)
20+
or strings.icontains(sender.email.domain.domain, 'concur')
21+
)
22+
23+
// Not from legitimate Concur domain with valid auth
24+
and not (
25+
sender.email.domain.root_domain in~ (
26+
'concursolutions.com',
27+
'concur.com',
28+
'sap.com',
29+
'concurcdc.cn',
30+
'direcaoconcursos.com.br'
31+
)
32+
and headers.auth_summary.dmarc.pass
33+
)
34+
35+
attack_types:
36+
- "Credential Phishing"
37+
tactics_and_techniques:
38+
- "Impersonation: Brand"
39+
- "Social engineering"
40+
detection_methods:
41+
- "Content analysis"
42+
- "Header analysis"
43+
- "Sender analysis"
44+
- "URL analysis"
45+
- "Machine Learning"
46+
id: "14785ff4-f4bf-583e-a280-81c0075cdb2e"
47+
og_id: "b1e6ebd8-3097-5adb-8d9e-c0e51e7baa95"
48+
testing_pr: 3408
49+
testing_sha: 0dba221477d615aec909d8d83f350c10dca58508

0 commit comments

Comments
 (0)