|
| 1 | +name: "Link: HR impersonation with suspicious domain indicators and credential theft" |
| 2 | +description: "Detects messages impersonating HR departments containing many links with malformed domains, suspicious TLD patterns, and credential theft language detected through URL analysis." |
| 3 | +type: "rule" |
| 4 | +severity: "high" |
| 5 | +source: | |
| 6 | + type.inbound |
| 7 | + // high number of links |
| 8 | + and length(body.links) > 20 |
| 9 | + // hr-related subject or sender |
| 10 | + and ( |
| 11 | + regex.icontains(sender.display_name, "\\bhr\\b") |
| 12 | + or strings.icontains(sender.display_name, "human resources") |
| 13 | + or strings.icontains(sender.display_name, "employee relation") |
| 14 | + or regex.icontains(subject.subject, "sal[ai1l|]r[i1l|]es") |
| 15 | + or regex.icontains(subject.subject, "hr__.{0,30}") |
| 16 | + or regex.icontains(subject.subject, "work.{0,5}hours") |
| 17 | + or regex.icontains(subject.subject, |
| 18 | + "instant:.{0,20}(salaries|salary|changed|update)" |
| 19 | + ) |
| 20 | + or strings.icontains(body.current_thread.text, "vacation plan") |
| 21 | + ) |
| 22 | + // suspect domain irregularities (like www.,company.com) |
| 23 | + and any(body.links, |
| 24 | + ( |
| 25 | + // malformed domains with comma variations |
| 26 | + regex.icontains(.display_text, "www.?,") |
| 27 | + // multiple consecutive dots |
| 28 | + or regex.icontains(.display_text, "\\.{2,}") |
| 29 | + // comma in domain position |
| 30 | + or regex.icontains(.display_text, "\\.,") |
| 31 | + // suspicious TLD patterns that might be typosquatting |
| 32 | + or regex.icontains(.display_text, "\\.(tu|cg|mv|tk|3v|ct|jh)/") |
| 33 | + // random characters in TLD position |
| 34 | + or regex.icontains(.display_text, |
| 35 | + "\\.[a-z0-9]{1,3}/[a-z0-9]+/[a-z0-9]+/" |
| 36 | + ) |
| 37 | + // URLs that contain obvious credential theft terms in the path |
| 38 | + or regex.icontains(.display_text, |
| 39 | + "/(sal[ai1l|]r[i1l|]es|login|auth|verify|portal|payment)/" |
| 40 | + ) |
| 41 | + ) |
| 42 | + and .visible == true |
| 43 | + and any(ml.nlu_classifier(beta.ocr(ml.link_analysis(.).screenshot).text).intents, |
| 44 | + .name == "cred_theft" and .confidence == "high" |
| 45 | + ) |
| 46 | + ) |
| 47 | + // exclusions for legitimate sources |
| 48 | + and not any(ml.nlu_classifier(body.current_thread.text).topics, |
| 49 | + .name in ( |
| 50 | + "Security and Authentication", |
| 51 | + "Secure Message", |
| 52 | + "Newsletters and Digests", |
| 53 | + "Entertainment and Sports" |
| 54 | + ) |
| 55 | + and .confidence in ("medium", "high") |
| 56 | + ) |
| 57 | + // exclude messages with a bunch of previous corrospondance |
| 58 | + and not length(body.previous_threads) > 5 |
| 59 | +
|
| 60 | +attack_types: |
| 61 | + - "Credential Phishing" |
| 62 | +tactics_and_techniques: |
| 63 | + - "Impersonation: Employee" |
| 64 | + - "Social engineering" |
| 65 | + - "Lookalike domain" |
| 66 | +detection_methods: |
| 67 | + - "Content analysis" |
| 68 | + - "Natural Language Understanding" |
| 69 | + - "Computer Vision" |
| 70 | + - "URL analysis" |
| 71 | + - "URL screenshot" |
| 72 | +id: "f31f8831-905e-5384-97b3-70f6f84c7fcc" |
0 commit comments