Skip to content

Commit 243e48e

Browse files
committed
New rule
1 parent 2044a59 commit 243e48e

File tree

1 file changed

+54
-0
lines changed

1 file changed

+54
-0
lines changed
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
name: "Impersonation: Recipient organization in sender display name with credential theft image"
2+
description: "Sender display name contains the recipient's organization domain while the actual email address differs. Message includes a single image attachment with OCR-detected credential theft language referencing the recipient's domain, and has minimal or no body text."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and length(body.links) <= 1
8+
and length(attachments) == 1
9+
and strings.icontains(sender.display_name, recipients.to[0].email.domain.sld)
10+
and sender.display_name != sender.email.email
11+
and (
12+
// No body text
13+
(
14+
length(body.current_thread.text) == 0
15+
or body.current_thread.text is null
16+
)
17+
18+
19+
)
20+
and (
21+
all(attachments,
22+
(.file_type in $file_types_images)
23+
and (
24+
any(file.explode(.),
25+
(
26+
(
27+
(
28+
strings.icontains(.scan.ocr.raw,
29+
recipients.to[0].email.domain.sld
30+
)
31+
)
32+
)
33+
and any(ml.nlu_classifier(.scan.ocr.raw).intents,
34+
.name == "cred_theft" and .confidence == "high"
35+
)
36+
)
37+
)
38+
)
39+
)
40+
)
41+
42+
attack_types:
43+
- "Credential Phishing"
44+
tactics_and_techniques:
45+
- "Image as content"
46+
- "Impersonation: Brand"
47+
- "Social engineering"
48+
detection_methods:
49+
- "Computer Vision"
50+
- "Content analysis"
51+
- "File analysis"
52+
- "Natural Language Understanding"
53+
- "Optical Character Recognition"
54+
- "Sender analysis"

0 commit comments

Comments
 (0)