Skip to content

Commit

Permalink
Update impersonation_sharepoint_fake_file_share.yml (#997)
Browse files Browse the repository at this point in the history
  • Loading branch information
morriscode authored Nov 20, 2023
1 parent 993d2e1 commit 42cf352
Showing 1 changed file with 7 additions and 4 deletions.
11 changes: 7 additions & 4 deletions detection-rules/impersonation_sharepoint_fake_file_share.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,12 @@ type: "rule"
severity: "medium"
source: |
type.inbound
// Sharepoint body content looks like this
and strings.contains(body.current_thread.text, "shared a file with you")
and strings.icontains(subject.subject, "shared")
and any(ml.logo_detect(beta.message_screenshot()).brands, .name == "Microsoft")
// fake Sharepoint shares are easy to identify if there are any links
// that don't point to microsoft[.]com or *.sharepoint[.]com
and not all(body.links,
Expand All @@ -26,9 +26,11 @@ source: |
"office.com",
"onedrive.com",
"sharepointonline.com",
"yammer.com"
"yammer.com",
//ignore microsoft privacy statement links
"aka.ms"
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
Expand All @@ -51,6 +53,7 @@ source: |
and not profile.by_sender().any_false_positives
)
)
attack_types:
- "Credential Phishing"
- "Malware/Ransomware"
Expand Down

0 comments on commit 42cf352

Please sign in to comment.