Skip to content

Commit 759d074

Browse files
[PR #3661] added rule: Attachment: PDF with banking and payment references from freemail sender
1 parent 2be2e7f commit 759d074

File tree

1 file changed

+37
-0
lines changed

1 file changed

+37
-0
lines changed
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
name: "Attachment: PDF with banking and payment references from freemail sender"
2+
description: "Detects PDF attachments containing banking terminology such as SWIFT codes, account numbers, and payment references from free email providers. These attachments often contain fraudulent payment instructions or fake banking documents used in business email compromise attacks."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and sender.email.domain.root_domain in $free_email_providers
8+
and length(attachments) == 1
9+
and any(filter(attachments,
10+
.file_extension == "pdf"),
11+
any(file.explode(.),
12+
.depth == 1
13+
and (
14+
regex.icontains(.scan.ocr.raw, "payment")
15+
or regex.contains(.scan.ocr.raw, "SWIFT")
16+
or regex.contains(.scan.ocr.raw, "Swift Copy")
17+
or regex.icontains(.scan.ocr.raw, "bank code:")
18+
or regex.icontains(.scan.ocr.raw, "account number:")
19+
or regex.icontains(.scan.ocr.raw, "payment")
20+
)
21+
)
22+
)
23+
24+
attack_types:
25+
- "BEC/Fraud"
26+
tactics_and_techniques:
27+
- "Free email provider"
28+
- "PDF"
29+
- "Social engineering"
30+
detection_methods:
31+
- "File analysis"
32+
- "Optical Character Recognition"
33+
- "Sender analysis"
34+
id: "054acfa2-ba42-54d0-ba6e-ce562db7fd56"
35+
og_id: "3d46be24-a640-515d-bae9-480effa2b5c8"
36+
testing_pr: 3661
37+
testing_sha: e657dc85cfd6495043c7aae1e45046e22bef375e

0 commit comments

Comments
 (0)