Skip to content

Commit d783885

Browse files
authored
Create link_personalized_url_recipient_address on_commonly_abused_web_service.yml
1 parent e549c5a commit d783885

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
name: "Link: Personalized URL with recipient address on commonly abused web service"
2+
description: "Detects messages containing links to file hosting or self-service platforms where the recipient's email address is embedded in the URL path, fragment, or base64-encoded components, indicating targeted personalization tactics."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and length(recipients.to) == 1
8+
and recipients.to[0].email.domain.valid
9+
and 0 < length(body.links) < 10
10+
and any(body.links,
11+
// root domain is commonly abused
12+
(
13+
.href_url.domain.root_domain in $free_file_hosts
14+
or .href_url.domain.root_domain in $self_service_creation_platform_domains
15+
)
16+
and (
17+
// the recipient email is in the url
18+
(
19+
strings.icontains(.href_url.path, recipients.to[0].email.email)
20+
or strings.icontains(.href_url.fragment,
21+
recipients.to[0].email.email
22+
)
23+
or any(strings.scan_base64(.href_url.path, ignore_padding=true),
24+
strings.icontains(., recipients.to[0].email.email)
25+
)
26+
or any(strings.scan_base64(.href_url.fragment, ignore_padding=true),
27+
strings.icontains(., recipients.to[0].email.email)
28+
)
29+
)
30+
)
31+
// the url contains a #
32+
and strings.contains(.href_url.url, '#')
33+
)
34+
35+
attack_types:
36+
- "Credential Phishing"
37+
- "Malware/Ransomware"
38+
tactics_and_techniques:
39+
- "Free file host"
40+
- "Social engineering"
41+
detection_methods:
42+
- "URL analysis"
43+
- "Header analysis"

0 commit comments

Comments
 (0)