Skip to content

Commit 3c44abc

Browse files
D-BoltonCI Bot
andauthored
Create impersonation_display_name_cred_theft_image.yml (#4000)
Co-authored-by: CI Bot <hello@sublimesecurity.com>
1 parent a149df1 commit 3c44abc

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
name: "Impersonation: Recipient organization in sender display name with credential theft image"
2+
description: "Sender display name contains the recipient's organization domain while the actual email address differs. Message includes a single image attachment with OCR-detected credential theft language referencing the recipient's domain, and has no body text."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and length(body.links) <= 1
8+
and length(attachments) == 1
9+
and strings.icontains(sender.display_name, recipients.to[0].email.domain.sld)
10+
and length(recipients.to) == 1
11+
and recipients.to[0].email.domain.root_domain in $org_domains
12+
and
13+
// No body text
14+
(
15+
length(body.current_thread.text) == 0 or body.current_thread.text is null
16+
)
17+
and all(attachments,
18+
.file_type in $file_types_images
19+
//
20+
// This rule makes use of a beta feature and is subject to change without notice
21+
// using the beta feature in custom rules is not suggested until it has been formally released
22+
//
23+
and strings.icontains(beta.ocr(.).text,
24+
recipients.to[0].email.domain.sld
25+
)
26+
and any(ml.nlu_classifier(beta.ocr(.).text).intents,
27+
.name == "cred_theft" and .confidence == "high"
28+
)
29+
)
30+
attack_types:
31+
- "Credential Phishing"
32+
tactics_and_techniques:
33+
- "Image as content"
34+
- "Impersonation: Brand"
35+
- "Social engineering"
36+
detection_methods:
37+
- "Computer Vision"
38+
- "Content analysis"
39+
- "File analysis"
40+
- "Natural Language Understanding"
41+
- "Optical Character Recognition"
42+
- "Sender analysis"
43+
id: "6abfb20e-ca83-5e24-ad1e-609e6df9dd24"

0 commit comments

Comments
 (0)