Skip to content

Commit cb58a9c

Browse files
[PR #3738] added rule: BEC with VIP impersonation and mismatched reply-to
1 parent f3715e1 commit cb58a9c

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
name: "BEC with VIP impersonation and mismatched reply-to"
2+
description: "Detects Business Email Compromise attacks that include VIP names in PDF attachments while using mismatched From and Reply-to headers from high-confidence BEC language analysis."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
// mismatched From and Reply-to
8+
and (
9+
length(headers.reply_to) > 0
10+
and all(headers.reply_to,
11+
.email.domain.root_domain != sender.email.domain.root_domain
12+
)
13+
)
14+
// has an attachment
15+
and length(filter(attachments, .file_type == "pdf")) > 0
16+
// contains vip name in the contents of a pdf (like a bill)
17+
and any(attachments,
18+
.file_type == "pdf"
19+
and any(file.explode(.),
20+
.scan.ocr.raw is not null
21+
and any($org_vips,
22+
strings.icontains(..scan.ocr.raw, .display_name)
23+
)
24+
)
25+
)
26+
and any(ml.nlu_classifier(body.current_thread.text).intents,
27+
.name in ("bec") and .confidence == "high"
28+
)
29+
30+
attack_types:
31+
- "BEC/Fraud"
32+
tactics_and_techniques:
33+
- "Impersonation: VIP"
34+
- "PDF"
35+
- "Social engineering"
36+
- "Evasion"
37+
detection_methods:
38+
- "Content analysis"
39+
- "File analysis"
40+
- "Header analysis"
41+
- "Natural Language Understanding"
42+
- "Optical Character Recognition"
43+
id: "482af189-b346-5309-bd30-bcebaf66bacd"
44+
og_id: "3be1e87c-b03d-5384-a685-ff61cbb1714f"
45+
testing_pr: 3738
46+
testing_sha: f9fec99849100bfdf8e10feac3e031d2daf9d394

0 commit comments

Comments
 (0)