Skip to content

Commit 264131b

Browse files
[Test Rules] [PR #4368] added rule: Link: Invoice-related BEC with newly registered domain < 60 days
1 parent f90a4e4 commit 264131b

1 file changed

Lines changed: 65 additions & 0 deletions

File tree

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
name: "Link: Invoice-related BEC with newly registered domain < 60 days "
2+
description: "Detects Business Email Compromise attacks using fake reply/forward threads containing links to newly registered domains (less than 60 days old) with invoice-related language and engaging action words. The message includes financial or payment terminology and prompts the recipient to take action through suspicious links."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and (subject.is_reply or subject.is_forward)
8+
and (
9+
any(body.current_thread.links, network.whois(.href_url.domain).days_old < 60)
10+
and any(body.links,
11+
regex.icontains(.display_text,
12+
'[VIEW|REVIEW|CLICK|DOWNLOAD|CHECK|VALIDATE]'
13+
)
14+
)
15+
and any([body.current_thread.text],
16+
regex.icontains(.,
17+
'wire transfer',
18+
'payment',
19+
'invoice',
20+
'ACH',
21+
'kindly download',
22+
'document',
23+
'kindly',
24+
'urgently',
25+
'confirm'
26+
)
27+
)
28+
and (
29+
// language attempting to engage
30+
(
31+
any(ml.nlu_classifier(body.current_thread.text).entities,
32+
.name in ("request", "financial")
33+
)
34+
)
35+
// invoicing language
36+
and any(ml.nlu_classifier(body.current_thread.text).tags,
37+
.name == "invoice"
38+
)
39+
)
40+
)
41+
// prevent benign emails
42+
and any(ml.nlu_classifier(body.current_thread.text).intents, .name != "benign")
43+
// negate highly trusted sender domains unless they fail DMARC authentication
44+
and (
45+
(
46+
sender.email.domain.root_domain in $high_trust_sender_root_domains
47+
and not headers.auth_summary.dmarc.pass
48+
)
49+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
50+
)
51+
52+
attack_types:
53+
- "BEC/Fraud"
54+
tactics_and_techniques:
55+
- "Social engineering"
56+
- "Evasion"
57+
- "Spoofing"
58+
detection_methods:
59+
- "Header analysis"
60+
- "Sender analysis"
61+
- "URL analysis"
62+
id: "51c6b50f-7a68-5ee8-9897-510d11bc255c"
63+
og_id: "fee020b6-4a01-5ed3-a924-b5aa4415d3e9"
64+
testing_pr: 4368
65+
testing_sha: 04bf2bb2c0edddece7c3ecf47308b1ac9c91550c

0 commit comments

Comments
 (0)