Skip to content

Commit

Permalink
Tighten up X impersonation (#918)
Browse files Browse the repository at this point in the history
  • Loading branch information
jkamdjou authored Nov 5, 2023
1 parent 500df97 commit 482cc75
Show file tree
Hide file tree
Showing 2 changed files with 25 additions and 2 deletions.
3 changes: 2 additions & 1 deletion detection-rules/impersonation_dhl.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,8 @@ source: |
'dhl.co.uk',
'dpdhl.com',
'dhl.de',
'dhl.fr'
'dhl.fr',
'dhlending.com'
)
and (
profile.by_sender().prevalence in ("new", "outlier")
Expand Down
24 changes: 23 additions & 1 deletion detection-rules/impersonation_x_with_credphish_nlu.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ type: "rule"
severity: "medium"
source: |
type.inbound
and (sender.display_name =~ "x" or sender.email.local_part =~ "x")
and sender.display_name =~ "x"
and sender.email.domain.root_domain not in ("twitter.com", "x.com")
and (
any(attachments,
Expand All @@ -22,6 +22,28 @@ source: |
.name == "cred_theft" and .confidence != "low"
)
)
// sender profile is new or outlier
and (
profile.by_sender().prevalence in ("new", "outlier")
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_false_positives
)
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and (
any(distinct(headers.hops, .authentication_results.dmarc is not null),
strings.ilike(.authentication_results.dmarc, "*fail")
)
)
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
attack_types:
- "Credential Phishing"
tactics_and_techniques:
Expand Down

0 comments on commit 482cc75

Please sign in to comment.