Skip to content
Merged
Changes from 3 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 26 additions & 0 deletions detection-rules/attachment_employment_contract_update.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
name: "Attachment: Employment contract update with suspicious file naming"
description: "Detects messages containing two attachments where one is a PowerPoint file with suspicious character substitution in the filename ('Empl0yment' using zero instead of 'o') and body text claiming an employment contract has been updated."
type: "rule"
severity: "high"
source: |
type.inbound
// two attachments, one png and one pptx
and length(attachments) == 2
// the pptx has Empl0yment in name
and length(filter(attachments,
.content_type == "application/octet-stream"
and strings.contains(.file_name, "Empl0yment")
)
) == 1
and strings.icontains(body.current_thread.text,
"Your Employment Contract has being updated"
)
attack_types:
- "Malware/Ransomware"
tactics_and_techniques:
- "Evasion"
- "Social engineering"
detection_methods:
- "Content analysis"
- "File analysis"
id: "8bdcd2da-c970-5b55-81f8-1b95d3d9dce0"
Loading