Skip to content

Commit

Permalink
Create abuse_docsend_new_domain.yml (#2164)
Browse files Browse the repository at this point in the history
Co-authored-by: ID Generator <[email protected]>
Co-authored-by: Aiden Mitchell <[email protected]>
  • Loading branch information
3 people authored Dec 18, 2024
1 parent 099d327 commit 6eda67a
Showing 1 changed file with 37 additions and 0 deletions.
37 changes: 37 additions & 0 deletions detection-rules/abuse_docsend_new_domain.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
name: "Service Abuse: DocSend Share From Newly Registered Domain"
description: "This Attack Surface Reduction (ASR) rule matches on DocSend notifications with recently registered reply-to domains."
type: "rule"
severity: "high"
source: |
type.inbound
// Legitimate DocSend sending infratructure
and sender.email.email == "[email protected]"
and headers.auth_summary.spf.pass
and headers.auth_summary.dmarc.pass
// the message needs to have a reply-to address
and length(headers.reply_to) > 0
// reply-to email address has never received an email from your org
and not any(headers.reply_to, .email.email in $recipient_emails)
// new reply-to
and any(headers.reply_to,
network.whois(.email.domain).days_old < 30
)
tags:
- "Attack surface reduction"
attack_types:
- "BEC/Fraud"
- "Credential Phishing"
tactics_and_techniques:
- "Evasion"
- "Free file host"
- "Impersonation: Brand"
- "Social engineering"
detection_methods:
- "Content analysis"
- "Header analysis"
- "Sender analysis"
id: "3bc152f2-6722-57be-b924-055c35fa1e60"

0 comments on commit 6eda67a

Please sign in to comment.