Skip to content

Commit

Permalink
Sync from PR#1108
Browse files Browse the repository at this point in the history
Create impersonation_dashlane.yml by @aidenmitchell
#1108
Source SHA 4cb2819
Triggered by @morriscode
  • Loading branch information
Sublime Rule Testing Bot committed Dec 7, 2023
1 parent 5b8f70e commit 411bb65
Showing 1 changed file with 42 additions and 0 deletions.
42 changes: 42 additions & 0 deletions detection-rules/impersonation_dashlane.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
name: "Brand impersonation: Dashlane"
description: "Impersonation of the password management software Dashlane."
type: "rule"
severity: "medium"
source: |
type.inbound
and (
regex.icontains(sender.display_name, '\bDashlane\b')
or strings.ilike(sender.email.domain.domain, '*Dashlane*')
)
and sender.email.domain.root_domain not in~ ('dashlane.com')
and (
profile.by_sender().prevalence in ("new", "outlier")
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_false_positives
)
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and (
any(distinct(headers.hops, .authentication_results.dmarc is not null),
strings.ilike(.authentication_results.dmarc, "*fail")
)
)
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Impersonation: Brand"
- "Social engineering"
detection_methods:
- "Header analysis"
- "Sender analysis"
id: "9e400937-4e7e-53fe-ad34-8393ab01890e"
testing_pr: 1108
testing_sha: 4cb2819dc9048f6869325d03f18277d4b59138f6

0 comments on commit 411bb65

Please sign in to comment.