Skip to content

Commit f021d3b

Browse files
authored
Create link_credential_theft_ajax_functionality_free_image_hosting_services.yml
1 parent 289e954 commit f021d3b

File tree

1 file changed

+40
-0
lines changed

1 file changed

+40
-0
lines changed
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
name: "Link: Credential theft with AJAX functionality and free image hosting services"
2+
description: "Detects unsolicited messages containing links that lead to pages with AJAX functionality targeting password fields and utilizing images from free hosting services, indicating potential credential harvesting operations."
3+
type: "rule"
4+
severity: "high"
5+
source: |
6+
type.inbound
7+
and 0 < length(body.links) < 10
8+
and not profile.by_sender().solicited
9+
and length(recipients.to) == 1
10+
and recipients.to[0].email.domain.valid
11+
and any(body.links,
12+
(
13+
// ajax
14+
regex.icontains(ml.link_analysis(.).final_dom.raw,
15+
'\$\.ajax\s*\(\s*\{[^}]+url:\s*[\x22\x27][^\x22\x27]+\.php[\x22\x27]'
16+
)
17+
// page contains password string
18+
and strings.icontains(ml.link_analysis(.).final_dom.raw,
19+
'password'
20+
)
21+
// images from free hosting services
22+
and regex.icontains(ml.link_analysis(.).final_dom.raw,
23+
'svgur\.com|cdn\.glitch\.global|imgbox\.com|svgshare\.com|freepnglogos\.com|firebasestorage\.googleapis\.com|archive\.org|web\.archive\.org|pngimg\.com|imgur\.com|i\.hizliresim\.com|pinimg\.com|freepik\.com|postimg\.org|postimg\.cc|img\.favpng\.com|gyazo\.com|ibb\.co|image\.thum\.io|iili\.io|zupimages\.net|imagedelivery\.net|images\.seeklogo\.com|images\.unsplash\.com'
24+
)
25+
)
26+
)
27+
28+
attack_types:
29+
- "Credential Phishing"
30+
tactics_and_techniques:
31+
- "Evasion"
32+
- "Free file host"
33+
- "Scripting"
34+
- "Social engineering"
35+
detection_methods:
36+
- "Content analysis"
37+
- "Javascript analysis"
38+
- "Sender analysis"
39+
- "URL analysis"
40+
- "URL screenshot"

0 commit comments

Comments
 (0)