Skip to content

Commit 6fd4729

Browse files
authored
Create link_microsoft_word_generated_content_with_likely_credential_theft_language.yml
1 parent c8898a1 commit 6fd4729

File tree

1 file changed

+30
-0
lines changed

1 file changed

+30
-0
lines changed
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
name: "Link: Microsoft Word generated content with credential theft language"
2+
description: "Detects messages containing links and credential theft language where the HTML content was generated by Microsoft Word, targeting a single recipient from an unsolicited sender."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and 0 < length(body.links) < 30
8+
and not profile.by_sender().solicited
9+
and length(recipients.to) == 1
10+
and recipients.to[0].email.domain.valid
11+
and strings.icontains(body.html.raw,
12+
// page generated by microsoft word
13+
'<meta name="Generator" content="Microsoft Word'
14+
)
15+
// display text classified as cred theft
16+
and any(ml.nlu_classifier(body.html.display_text).intents,
17+
.name == "cred_theft" and .confidence in ("high")
18+
)
19+
20+
attack_types:
21+
- "Credential Phishing"
22+
tactics_and_techniques:
23+
- "Social engineering"
24+
- "Evasion"
25+
detection_methods:
26+
- "Content analysis"
27+
- "HTML analysis"
28+
- "Natural Language Understanding"
29+
- "Sender analysis"
30+
- "URL analysis"

0 commit comments

Comments
 (0)