diff --git a/detection-rules/open_redirect_next2.yml b/detection-rules/open_redirect_next2.yml new file mode 100644 index 00000000000..762f64230bc --- /dev/null +++ b/detection-rules/open_redirect_next2.yml @@ -0,0 +1,41 @@ +name: "Open redirect: next2.io" +description: "Message contains use of a next.io redirect. This redirection has been abused by threat actors in the wild." +type: "rule" +severity: "medium" +source: | + type.inbound + and any(body.links, + .href_url.domain.domain == "c.next2.io" + and .href_url.path =~ "/api/ads" + and strings.icontains(.href_url.query_params, 'fallback_url=') + ) + and ( + not profile.by_sender().solicited + or ( + profile.by_sender().any_messages_malicious_or_spam + and not profile.by_sender().any_false_positives + ) + ) + + // negate highly trusted sender domains unless they fail DMARC authentication + and ( + ( + sender.email.domain.root_domain in $high_trust_sender_root_domains + and not headers.auth_summary.dmarc.pass + ) + or sender.email.domain.root_domain not in $high_trust_sender_root_domains + ) +attack_types: + - "Credential Phishing" +tactics_and_techniques: + - "Evasion" + - "Open redirect" + - "Social engineering" +detection_methods: + - "Content analysis" + - "Header analysis" + - "Sender analysis" + - "URL analysis" +id: "5085c422-6fce-5ce9-836b-d4834117e810" +testing_pr: 2057 +testing_sha: b8449b60a98bd91fe509fb035a4c28888b03f7c6