Skip to content

Commit

Permalink
Sync from PR#2186
Browse files Browse the repository at this point in the history
Create abuse_google_drive_new_sender_domain.yml by @zoomequipd
#2186
Source SHA 5be7870
Triggered by @zoomequipd
  • Loading branch information
Sublime Rule Testing Bot committed Dec 26, 2024
1 parent 12ff219 commit 34e5452
Showing 1 changed file with 34 additions and 0 deletions.
34 changes: 34 additions & 0 deletions detection-rules/abuse_google_drive_new_sender_domain.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
name: "Service Abuse: Google Drive Share From New Reply-To Domain"
description: "A Google Drive sharing notification containing a reply-to address from a recently registered domain (less than 30 days old). The reply-to domain does not match any organizational domains."
type: "rule"
severity: "medium"
source: |
type.inbound
and sender.email.email in (
'[email protected]',
'[email protected]',
)
and not any(headers.reply_to, .email.domain.domain in $org_domains)
// the message needs to have a reply-to address
and length(headers.reply_to) > 0
// new reply-to
and any(headers.reply_to, network.whois(.email.domain).days_old < 30)
tags:
- "Attack surface reduction"
attack_types:
- "BEC/Fraud"
- "Callback Phishing"
- "Credential Phishing"
tactics_and_techniques:
- "Free email provider"
- "Social engineering"
- "Free file host"
detection_methods:
- "Header analysis"
- "Sender analysis"
- "Whois"
id: "c1a2d367-ebdd-5557-926d-fe7b9ebfa324"
testing_pr: 2186
testing_sha: 5be7870cd48e1ea9c1818df9a4d582e69c700843

0 comments on commit 34e5452

Please sign in to comment.