Skip to content

Commit 4cc6f22

Browse files
[PR #3809] added rule: Attachment: Fake lawyer payment document with suspicious banking details
1 parent aafec63 commit 4cc6f22

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
name: "Attachment: Fake lawyer payment document with suspicious banking details"
2+
description: "Detects messages from free email providers that impersonate lawyer communications with attached documents containing suspicious banking payment instructions and account details."
3+
type: "rule"
4+
severity: "high"
5+
source: |
6+
type.inbound
7+
and length(attachments) == 1
8+
and sender.email.domain.root_domain in $free_email_providers
9+
and (
10+
strings.icontains(body.current_thread.text, "lawyer")
11+
and strings.icontains(body.current_thread.text, "before")
12+
and strings.icontains(body.current_thread.text, "attached")
13+
)
14+
and (
15+
all([
16+
"payment to lawyer:",
17+
"bank code:",
18+
"account number:",
19+
"please send swift copy"
20+
],
21+
any(filter(attachments, .file_type == "docx"),
22+
any(file.explode(.), strings.icontains(.scan.strings.raw, ...))
23+
)
24+
or any(filter(attachments, .file_type == "pdf"),
25+
strings.icontains(beta.ocr(.).text, ..)
26+
)
27+
)
28+
)
29+
attack_types:
30+
- "BEC/Fraud"
31+
tactics_and_techniques:
32+
- "Free email provider"
33+
- "Impersonation: Employee"
34+
- "Social engineering"
35+
- "PDF"
36+
detection_methods:
37+
- "Content analysis"
38+
- "File analysis"
39+
- "Optical Character Recognition"
40+
- "Sender analysis"
41+
id: "e7a2717d-77e7-5164-9171-216f017342c6"
42+
og_id: "75aa34b3-9a77-5992-9722-9283405e9c49"
43+
testing_pr: 3809
44+
testing_sha: 4d37f8f9b9dc28c24eff13472285e2af13d80b19

0 commit comments

Comments
 (0)