-
Notifications
You must be signed in to change notification settings - Fork 50
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Create link_github_notification_abuse.yml by @zoomequipd #1855 Source SHA df20589 Triggered by @zoomequipd
- Loading branch information
Sublime Rule Testing Bot
committed
Aug 29, 2024
1 parent
40c0aaf
commit 27d6001
Showing
1 changed file
with
37 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
name: "GitHub Notification Abuse" | ||
description: "This detection rule matches GitHub notifications which contain links to free file hosts, free subdomain hosts, and url shortners. This has been seen in previous campaigns where malicious actors leveraged existing issues on public GitHub repositories by adding comments with links to Info Stealer malware." | ||
type: "rule" | ||
severity: "medium" | ||
source: | | ||
type.inbound | ||
// actual GitHub notifications | ||
and sender.email.email == "[email protected]" | ||
and all(headers.reply_to, .email.domain.domain == "reply.github.com") | ||
and headers.return_path.email == "[email protected]" | ||
and headers.auth_summary.spf.pass | ||
and headers.auth_summary.dmarc.pass | ||
// suspicious links | ||
and any( | ||
// filter any links that go back to GitHub | ||
filter(body.links, .href_url.domain.root_domain != 'github.com'), | ||
// see if the remaining links are within several lists | ||
.href_url.domain.root_domain in $free_file_hosts | ||
or ( | ||
.href_url.domain.root_domain in $free_subdomain_hosts | ||
and .href_url.domain.subdomain is not null | ||
) | ||
or .href_url.domain.root_domain in $url_shorteners | ||
) | ||
attack_types: | ||
- "Malware/Ransomware" | ||
tactics_and_techniques: | ||
- "Free subdomain host" | ||
- "Free file host" | ||
- "Evasion" | ||
detection_methods: | ||
- "Header analysis" | ||
- "Content analysis" | ||
- "URL analysis" | ||
id: "eabdee5e-1c96-543f-9786-26fda9cbe2d0" | ||
testing_pr: 1855 | ||
testing_sha: df205895ad04b3022d8dd4e93c198b6923c59f95 |