Skip to content

Commit

Permalink
New Rule: open_redirect_indeed.yml
Browse files Browse the repository at this point in the history
  • Loading branch information
aidenmitchell authored Oct 5, 2023
1 parent 9b20913 commit 9c7ae8c
Showing 1 changed file with 32 additions and 0 deletions.
32 changes: 32 additions & 0 deletions detection-rules/open_redirect_indeed.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
name: "Open redirect: Indeed"
description: "Detects emails containing links using Indeed '/r?target=xxxxxx' open redirect where the email has not come from indeed.com"
references:
- "https://www.bleepingcomputer.com/news/security/evilproxy-uses-indeedcom-open-redirect-for-microsoft-365-phishing/"
type: "rule"
severity: "medium"
source: |
type.inbound
and (
(
sender.email.domain.root_domain != "indeed.com"
and any(body.links,
.href_url.domain.domain == 't.indeed.com' and .href_url.path == '/r'
)
and any(body.links, strings.ilike(.href_url.query_params, '*target=*'))
)
or any(attachments,
.file_type == "pdf"
and any(file.explode(.),
any(.scan.url.urls, .domain.root_domain == 'indeed.com' and .path == '/r')
and any(.scan.url.urls, strings.ilike(.query_params, '*target=*'))
)
)
)
attack_types:
- "Credential Phishing"
- "Malware/Ransomware"
tactics_and_techniques:
- "Open redirect"
detection_methods:
- "Sender analysis"
- "URL analysis"

0 comments on commit 9c7ae8c

Please sign in to comment.