Skip to content

Commit

Permalink
Sync from PR#2060
Browse files Browse the repository at this point in the history
Create header_onmicrosoft_traversal.yml by @zoomequipd
#2060
Source SHA 7bbdab5
Triggered by @zoomequipd
  • Loading branch information
Sublime Rule Testing Bot committed Oct 25, 2024
1 parent 6a0f2b7 commit 6a54db1
Showing 1 changed file with 39 additions and 0 deletions.
39 changes: 39 additions & 0 deletions detection-rules/header_onmicrosoft_traversal.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
name: "Messaged Traversed Multiple onmicrosoft.com Tenants"
description: "This detection rule identifies messages that have traversed multiple distinct onmicrosoft.com tenants—a technique observed as an evasion tactic to distribute a single message across a list of targeted recipients."
type: "rule"
severity: "medium"
source: |
type.inbound
and length(recipients.to) == 1
and all(recipients.to,
.email.domain.root_domain == "onmicrosoft.com"
and not .email.domain.domain in $org_domains
)
// the message has traversed two or more different "onmicrosoft.com" subdomains
and length(distinct(map(filter(headers.hops,
strings.icontains(.authentication_results.spf_details.designator,
'.onmicrosoft.com'
)
and not strings.contains(.authentication_results.spf_details.designator,
"@"
)
),
.authentication_results.spf_details.designator
),
.
)
) > 1
and all(recipients.to, .email.domain.domain != headers.return_path.domain.domain)
attack_types:
- "Callback Phishing"
tactics_and_techniques:
- "Evasion"
- "Free email provider"
- "Free subdomain host"
detection_methods:
- "Sender analysis"
- "Header analysis"
id: "9cf01c0d-95d5-5ea6-8150-cf5879834e06"
testing_pr: 2060
testing_sha: 7bbdab5f98140171819f9f7092fe4db992574abc

0 comments on commit 6a54db1

Please sign in to comment.