Skip to content

Commit c69b291

Browse files
authored
Merge branch 'main' into morriscode-gitgudnoob
2 parents e6f8509 + 2948963 commit c69b291

14 files changed

+26
-21
lines changed

detection-rules/attachment_docusign_image_suspicious_links.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: "Attachment: DocuSign image lure with no DocuSign domains in links"
22
description: "Detects DocuSign phishing emails with no DocuSign links, a DocuSign logo attached, from a first-time sender."
33
type: "rule"
4-
severity: "medium"
4+
severity: "high"
55
source: |
66
type.inbound
77
and length(filter(attachments, .file_type not in $file_types_images)) == 0

detection-rules/attachment_eml_cred_theft.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,13 @@ source: |
1010
.content_type == "message/rfc822"
1111
and any(file.explode(.),
1212
any(.scan.url.urls,
13-
.domain.root_domain in $free_subdomain_hosts
14-
or .domain.root_domain in ("sharepoint.com")
15-
or .domain.root_domain not in $tranco_1m
13+
(
14+
.domain.root_domain in $free_subdomain_hosts
15+
or .domain.root_domain in ("sharepoint.com")
16+
or .domain.root_domain not in $tranco_1m
17+
)
18+
and beta.linkanalysis(.).credphish.disposition == "phishing"
1619
)
17-
and any(.scan.url.urls, beta.linkanalysis(.).credphish.disposition == "phishing")
1820
)
1921
)
2022

detection-rules/attachment_microsoft_image_lure_qr_code.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: "Brand impersonation: Microsoft (QR code)"
22
description: |
33
Detects messages using Microsoft image based lures, referencing or including a QR code from an Unsolicited sender. These messages often lead users to phishing sites or initiate unwanted downloads.
44
type: "rule"
5-
severity: "medium"
5+
severity: "high"
66
source: |
77
type.inbound
88
and (

detection-rules/attachment_office365_image.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: "Attachment: Office365 image (unsolicited)"
22
description: |
33
Looks for messages with an image attachment that contains words related to Microsoft, Office365, and passwords.
44
type: "rule"
5-
severity: "medium"
5+
severity: "high"
66
source: |
77
type.inbound
88
and length(filter(attachments, .file_type not in $file_types_images)) == 0

detection-rules/attachment_pdf_with_low_reputation_link_to_suspicious_files.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ source: |
1212
.file_extension == "pdf"
1313
and any(file.explode(.),
1414
any(.scan.pdf.urls,
15-
regex.contains(.path, '\.(?:exe|cab|vbs|ps1|rar|iso|dll|one|lnk|sh)')
15+
regex.contains(.path, '\.(?:exe|cab|vbs|ps1|rar|iso|dll|one|lnk|sh)\b')
1616
and .domain.root_domain not in $tranco_1m
1717
)
1818
)

detection-rules/impersonation_amazon.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ source: |
1414
)
1515
and (
1616
regex.icontains(sender.display_name,
17-
'\b[aaa𝝰aa𝑎𝗮𝕒𝖆𝓪𝚊𝞪аɑα𝔞𝒂𝘢𝛂⍺𝒶𝙖𝜶𝛼𝐚𝖺]maz[o0]n\s?(pay|marketplace|\.com)'
17+
'\b[aaa𝝰aa𝑎𝗮𝕒𝖆𝓪𝚊𝞪аɑα𝔞𝒂𝘢𝛂⍺𝒶𝙖𝜶𝛼𝐚𝖺]maz[o0]n\s?(pay|marketplace|\.com)|ᵃ⤻ᶻ'
1818
)
1919
or strings.ilevenshtein(sender.display_name, 'amazon.com') <= 1
2020
or strings.ilevenshtein(sender.display_name, 'amazon pay') <= 1

detection-rules/impersonation_fedex.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ source: |
1313
or strings.ilike(sender.email.domain.domain, '*fedex*')
1414
)
1515
// sedex.com is not affiliated with FedEx, but is an apparent FP
16-
and sender.email.domain.root_domain not in~ ('fedex.com', 'sedex.com')
16+
and sender.email.domain.root_domain not in~ ('fedex.com', 'sedex.com', 'myworkday.com')
1717
and sender.email.email not in $sender_emails
1818
attack_types:
1919
- "Credential Phishing"

detection-rules/impersonation_human_resources.yml

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,13 @@ source: |
99
'(\bh\W?r\W?\b|human resources|hr depart(ment)?|employee relations)'
1010
)
1111
and (length(body.links) > 0 or length(attachments) > 0)
12-
12+
1313
// Request and Urgency
14-
and any(ml.nlu_classifier(body.html.inner_text).entities, .name == "request")
15-
and any(ml.nlu_classifier(body.html.inner_text).entities, .name == "urgency")
14+
and any(ml.nlu_classifier(body.current_thread.text).entities, .name == "request")
15+
and any(ml.nlu_classifier(body.current_thread.text).entities, .name == "urgency")
1616
and (
17-
(
18-
length(ml.nlu_classifier(body.html.inner_text).intents) > 0
19-
and any(ml.nlu_classifier(body.html.inner_text).intents, .name != "benign")
20-
)
21-
or length(ml.nlu_classifier(body.html.inner_text).intents) == 0
17+
any(ml.nlu_classifier(body.current_thread.text).intents, .name != "benign")
18+
and not length(ml.nlu_classifier(body.current_thread.text).intents) == 0
2219
)
2320
and (
2421
(

detection-rules/impersonation_paypal.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ source: |
4949
'paypalcorp.com',
5050
'paypal-customerfeedback.com',
5151
'paypal-creditsurvey.com',
52+
'paypal-prepaid.com',
5253
'xoom.com'
5354
)
5455

detection-rules/impersonation_zoom_strict.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ source: |
1313
or sender.display_name =~ 'zoom video communications, inc.'
1414
or sender.display_name =~ 'zoom call'
1515
)
16-
and sender.email.domain.root_domain not in ('zoom.us', 'zuora.com')
16+
and sender.email.domain.root_domain not in ('zoom.us', 'zuora.com','zoomgov.com')
1717
and (
1818
// if this comes from a free email provider,
1919
// flag if org has never sent an email to sender's email before

0 commit comments

Comments
 (0)