Skip to content

Commit

Permalink
Sync from PR#1855
Browse files Browse the repository at this point in the history
Create link_github_notification_abuse.yml by @zoomequipd
#1855
Source SHA df20589
Triggered by @zoomequipd
  • Loading branch information
Sublime Rule Testing Bot committed Aug 29, 2024
1 parent 40c0aaf commit 27d6001
Showing 1 changed file with 37 additions and 0 deletions.
37 changes: 37 additions & 0 deletions detection-rules/link_github_notification_abuse.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
name: "GitHub Notification Abuse"
description: "This detection rule matches GitHub notifications which contain links to free file hosts, free subdomain hosts, and url shortners. This has been seen in previous campaigns where malicious actors leveraged existing issues on public GitHub repositories by adding comments with links to Info Stealer malware."
type: "rule"
severity: "medium"
source: |
type.inbound
// actual GitHub notifications
and sender.email.email == "[email protected]"
and all(headers.reply_to, .email.domain.domain == "reply.github.com")
and headers.return_path.email == "[email protected]"
and headers.auth_summary.spf.pass
and headers.auth_summary.dmarc.pass
// suspicious links
and any(
// filter any links that go back to GitHub
filter(body.links, .href_url.domain.root_domain != 'github.com'),
// see if the remaining links are within several lists
.href_url.domain.root_domain in $free_file_hosts
or (
.href_url.domain.root_domain in $free_subdomain_hosts
and .href_url.domain.subdomain is not null
)
or .href_url.domain.root_domain in $url_shorteners
)
attack_types:
- "Malware/Ransomware"
tactics_and_techniques:
- "Free subdomain host"
- "Free file host"
- "Evasion"
detection_methods:
- "Header analysis"
- "Content analysis"
- "URL analysis"
id: "eabdee5e-1c96-543f-9786-26fda9cbe2d0"
testing_pr: 1855
testing_sha: df205895ad04b3022d8dd4e93c198b6923c59f95

0 comments on commit 27d6001

Please sign in to comment.