Skip to content

Commit

Permalink
New Rule: Okta Impersonation
Browse files Browse the repository at this point in the history
  • Loading branch information
morriscode committed Nov 29, 2023
1 parent 6a7973e commit c101ece
Showing 1 changed file with 59 additions and 0 deletions.
59 changes: 59 additions & 0 deletions detection-rules/impersonation_okta.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
name: "Brand impersonation: Okta"
description: "Impersonation of Okta an Identity and access management company."
type: "rule"
severity: "medium"
source: |
type.inbound
and (
regex.icontains(sender.display_name, '\bOkta\b')
or strings.ilike(sender.email.domain.domain, '*Okta*')
or strings.ilike(subject.subject, '*Okta*')
)
and (
sender.email.domain.root_domain in~ (
'oktacdn.com',
'okta.com',
'okta-emea.com',
'okta-gov.com',
'oktapreview.com',
'polaris.me'
)
or any(distinct(headers.hops, .authentication_results.dmarc is not null),
strings.ilike(.authentication_results.dmarc, "*fail")
)
)
and any(ml.logo_detect(beta.message_screenshot()).brands,
.name == "Okta" and .confidence in ("medium", "high")
)
and (
profile.by_sender().prevalence in ("new", "outlier")
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_false_positives
)
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and (
any(distinct(headers.hops, .authentication_results.dmarc is not null),
strings.ilike(.authentication_results.dmarc, "*fail")
)
)
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Impersonation: Brand"
- "Lookalike domain"
- "Social engineering"
detection_methods:
- "Computer Vision"
- "Content analysis"
- "Header analysis"
- "Sender analysis"

0 comments on commit c101ece

Please sign in to comment.