diff --git a/detection-rules/attachment_html_smuggling_with_base64_script_source.yml b/detection-rules/attachment_html_smuggling_with_base64_script_source.yml
new file mode 100644
index 00000000000..1719bdd5e94
--- /dev/null
+++ b/detection-rules/attachment_html_smuggling_with_base64_script_source.yml
@@ -0,0 +1,70 @@
+name: "Attachment: HTML Smuggling with base64 source"
+description: |
+ Potential HTML smuggling attacks from new senders.
+ This rule detects HTML files as attachments or within archives that contain base64 sources from new and unsolicited senders.
+type: "rule"
+severity: "medium"
+source: |
+ type.inbound
+ and (
+ any(attachments,
+ (
+ .file_extension in~ ("html", "htm", "shtml", "dhtml")
+ or .file_type == "html"
+ or .content_type == "text/html"
+ )
+ and any(file.explode(.),
+ length(.scan.strings.strings) < 20
+ and any(.scan.strings.strings,
+ regex.icontains(., 'src="data:text/html;base64')
+ )
+ )
+ )
+ or any(attachments,
+ (.file_extension in~ $file_extensions_common_archives)
+ and any(file.explode(.),
+ (
+ .file_extension in~ ("html", "htm", "shtml", "dhtml")
+ or ..file_type == "html"
+ or ..content_type == "text/html"
+ )
+ and length(.scan.strings.strings) < 20
+ and any(.scan.strings.strings,
+ regex.icontains(., 'src="data:text/html;base64')
+ )
+ )
+ )
+ )
+ and (
+ profile.by_sender().prevalence in ("new", "outlier")
+ and not profile.by_sender().solicited
+ )
+
+ and not profile.by_sender().any_false_positives
+
+ // negate highly trusted sender domains unless they fail DMARC authentication
+ and (
+ (
+ sender.email.domain.root_domain in $high_trust_sender_root_domains
+ and (
+ any(distinct(headers.hops, .authentication_results.dmarc is not null),
+ strings.ilike(.authentication_results.dmarc, "*fail")
+ )
+ )
+ )
+ or sender.email.domain.root_domain not in $high_trust_sender_root_domains
+ )
+attack_types:
+ - "Credential Phishing"
+ - "Malware/Ransomware"
+tactics_and_techniques:
+ - "Evasion"
+ - "HTML smuggling"
+detection_methods:
+ - "Archive analysis"
+ - "Content analysis"
+ - "File analysis"
+ - "HTML analysis"
+ - "Sender analysis"
+
+id: "f352db77-f2c9-5cfc-b8d3-8adf889f70f3"