Skip to content

Commit

Permalink
Sync from PR#2251
Browse files Browse the repository at this point in the history
Create link_azurecomm.yml by @zoomequipd
#2251
Source SHA dd8c23e
Triggered by @zoomequipd
  • Loading branch information
Sublime Rule Testing Bot committed Dec 27, 2024
1 parent 6153ca2 commit 0121c64
Showing 1 changed file with 43 additions and 0 deletions.
43 changes: 43 additions & 0 deletions detection-rules/link_azurecomm.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
name: "Link: Azure Communication Services From New Sender"
description: "Detects messages with azurecomm.net links containing URL parameters from senders who either are newly observed or have a history of malicious activity without false positives."
type: "rule"
severity: "medium"
source: |
type.inbound
and any(body.links,
.href_url.domain.root_domain == "azurecomm.net"
and strings.icontains(.href_url.query_params, "url=")
// legit senders often redirect to the root domain of the sender
and not strings.icontains(.href_url.query_params, sender.email.domain.root_domain)
)
and (
(
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_false_positives
)
or profile.by_sender_email().prevalence == "new"
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and not headers.auth_summary.dmarc.pass
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
tags:
- "Attack surface reduction"
attack_types:
- "Callback Phishing"
- "Credential Phishing"
tactics_and_techniques:
- "Open redirect"
- "Social engineering"
detection_methods:
- "Header analysis"
- "URL analysis"
- "Sender analysis"
id: "636c07a0-4bb3-52fe-912e-d39b3cfa024c"
testing_pr: 2251
testing_sha: dd8c23ecea8513c47078ebe167f94adaa8f62a9b

0 comments on commit 0121c64

Please sign in to comment.