-
Notifications
You must be signed in to change notification settings - Fork 50
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
New Rule (Attachment): Fake attachment image lure (#723)
Co-authored-by: Sam Scholten <[email protected]> Co-authored-by: ID Generator <[email protected]> Co-authored-by: Sam Scholten <[email protected]>
- Loading branch information
1 parent
6489160
commit df55407
Showing
1 changed file
with
53 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
name: "Attachment: Fake attachment image lure" | ||
description: | | ||
Message body (or attached message body) contains a image faking an Outlook attachment button. The image contains OCR entities that are suspicious. | ||
type: "rule" | ||
severity: "medium" | ||
source: | | ||
type.inbound | ||
and ( | ||
// fake file attachment preview in original email | ||
any(attachments, | ||
.file_type in $file_types_images | ||
and .size < 5000 | ||
and any(file.explode(.), | ||
any(ml.nlu_classifier(.scan.ocr.raw).entities, | ||
.name in~ ("financial", "urgency") | ||
) | ||
) | ||
) | ||
or any(attachments, | ||
.file_type in $file_types_images | ||
and any(ml.logo_detect(.).brands, .name == "FakeAttachment") | ||
) | ||
// fake file attachment preview in attached EML | ||
or any(attachments, | ||
.content_type == "message/rfc822" | ||
and any(file.parse_eml(.).attachments, | ||
.file_type in $file_types_images | ||
and .size < 5000 | ||
and any(file.explode(.), | ||
any(ml.nlu_classifier(.scan.ocr.raw).entities, | ||
.name in~ ("financial", "urgency") | ||
) | ||
) | ||
) | ||
) | ||
) | ||
tags: | ||
- "Suspicious attachment" | ||
- "Suspicious content" | ||
attack_types: | ||
- "Credential Phishing" | ||
- "Malware/Ransomware" | ||
tactics_and_techniques: | ||
- "Evasion" | ||
- "Image as content" | ||
- "Social engineering" | ||
detection_methods: | ||
- "EML analysis" | ||
- "File analysis" | ||
- "Natural Language Understanding" | ||
- "Optical Character Recognition" | ||
id: "96b8b285-2116-5e45-b0ca-57b81dc87b94" |