File tree Expand file tree Collapse file tree 1 file changed +44
-0
lines changed
Expand file tree Collapse file tree 1 file changed +44
-0
lines changed Original file line number Diff line number Diff line change 1+ name : " Attachment: Fake lawyer payment document with suspicious banking details"
2+ description : " Detects messages from free email providers that impersonate lawyer communications with attached documents containing suspicious banking payment instructions and account details."
3+ type : " rule"
4+ severity : " high"
5+ source : |
6+ type.inbound
7+ and length(attachments) == 1
8+ and sender.email.domain.root_domain in $free_email_providers
9+ and (
10+ strings.icontains(body.current_thread.text, "lawyer")
11+ and strings.icontains(body.current_thread.text, "before")
12+ and strings.icontains(body.current_thread.text, "attached")
13+ )
14+ and (
15+ all([
16+ "payment to lawyer:",
17+ "bank code:",
18+ "account number:",
19+ "please send swift copy"
20+ ],
21+ any(filter(attachments, .file_type == "docx"),
22+ any(file.explode(.), strings.icontains(.scan.strings.raw, ...))
23+ )
24+ or any(filter(attachments, .file_type == "pdf"),
25+ strings.icontains(beta.ocr(.).text, ..)
26+ )
27+ )
28+ )
29+ attack_types :
30+ - " BEC/Fraud"
31+ tactics_and_techniques :
32+ - " Free email provider"
33+ - " Impersonation: Employee"
34+ - " Social engineering"
35+ - " PDF"
36+ detection_methods :
37+ - " Content analysis"
38+ - " File analysis"
39+ - " Optical Character Recognition"
40+ - " Sender analysis"
41+ id : " e7a2717d-77e7-5164-9171-216f017342c6"
42+ og_id : " 75aa34b3-9a77-5992-9722-9283405e9c49"
43+ testing_pr : 3809
44+ testing_sha : 4d37f8f9b9dc28c24eff13472285e2af13d80b19
You can’t perform that action at this time.
0 commit comments