Skip to content

Commit

Permalink
Sync from PR#930
Browse files Browse the repository at this point in the history
TEST - Update attachment_microsoft_image_lure_qr_code.yml by @morriscode
#930
Source SHA ca434ed
Triggered by @morriscode
  • Loading branch information
Sublime Rule Testing Bot committed Nov 7, 2023
1 parent a9105b5 commit fe24985
Showing 1 changed file with 21 additions and 0 deletions.
21 changes: 21 additions & 0 deletions detection-rules/attachment_microsoft_image_lure_qr_code.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
name: "Brand impersonation: Microsoft (QR code)"
description: |
Detects messages using Microsoft image based lures, referencing or including a QR code from an Unsolicited sender. These messages often lead users to phishing sites or initiate unwanted downloads.
type: "rule"
severity: "high"
source: "type.inbound\nand (\n any(attachments,\n (.file_type in $file_types_images or .file_type == \"pdf\")\n and any(ml.logo_detect(.).brands, strings.starts_with(.name, \"Microsoft\"))\n )\n or any(ml.logo_detect(beta.message_screenshot()).brands, strings.starts_with(.name, \"Microsoft\"))\n or (any(attachments, .file_type in~ $file_extensions_macros))\n)\nand any(attachments,\n (\n .file_type in $file_types_images\n or .file_type == \"pdf\"\n or .file_type in $file_extensions_macros\n )\n and (\n any(file.explode(.),\n regex.icontains(.scan.ocr.raw, 'scan|camera')\n and regex.icontains(.scan.ocr.raw, '\\bQR\\b|Q\\.R\\.|barcode')\n )\n or (\n any(file.explode(.),\n .scan.qr.type == \"url\"\n // recipient email address is present in the URL, a common tactic used in credential phishing attacks \n and any(recipients.to,\n strings.icontains(..scan.qr.data, .email.email)\n \n // the recipients sld is in the senders display name\n or any(recipients.to,\n strings.icontains(sender.display_name, .email.domain.sld)\n )\n\n // the recipient local is in the body \n or any(recipients.to,\n strings.icontains(body.current_thread.text, .email.local_part)\n )\n\n // or the body is null \n or body.current_thread.text is null\n or body.current_thread.text == \"\"\n\n // or the subject contains authentication/urgency verbiage\n or regex.contains(subject.subject,\n \"(Authenticat(e|or|ion)|2fa|Multi.Factor|(qr|bar).code|action.require|alert|Att(n|ention):)\"\n )\n )\n )\n )\n )\n)\nand (\n not any(headers.hops,\n .authentication_results.compauth.verdict is not null\n and .authentication_results.compauth.verdict == \"pass\"\n and sender.email.domain.domain == \"microsoft.com\"\n )\n)\n"
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Impersonation: Brand"
- "PDF"
- "QR code"
- "Social engineering"
detection_methods:
- "Computer Vision"
- "Header analysis"
- "QR code analysis"
- "Sender analysis"
id: "ed0f772a-6543-5947-80d1-55a11ea63074"
testing_pr: 930
testing_sha: ca434edac91d84ae5067d4660eb8917f5f2ffa1f

0 comments on commit fe24985

Please sign in to comment.