@@ -4,18 +4,24 @@ type: "rule"
44severity : " medium"
55source : |
66 type.inbound
7- and (body.current_thread.text is null or length(body.current_thread.text) < 500)
7+ and length(body.current_thread.text) < 2000
88 and any(attachments,
9- (.file_extension in~ ("ppt", "pptx"))
10- and (
11- any(file.explode(.),
12- any(ml.nlu_classifier(.scan.strings.raw).intents,
13- .name == "callback_scam" and .confidence != "low"
14- )
15- )
9+ .file_extension in~ ("ppt", "pptx")
10+ and any(file.explode(.),
11+ any(ml.nlu_classifier(.scan.strings.raw).intents,
12+ .name == "callback_scam" and .confidence != "low"
13+ )
1614 )
1715 )
18- and not sender.email.domain.root_domain in $high_trust_sender_root_domains
16+ and sender.email.domain.root_domain in $free_email_providers
17+ // negate highly trusted sender domains unless they fail DMARC authentication
18+ and (
19+ coalesce(sender.email.domain.root_domain in $high_trust_sender_root_domains
20+ and not headers.auth_summary.dmarc.pass,
21+ false
22+ )
23+ or sender.email.domain.root_domain not in $high_trust_sender_root_domains
24+ )
1925attack_types :
2026 - " Callback Phishing"
2127tactics_and_techniques :
@@ -26,4 +32,4 @@ detection_methods:
2632id : " 17aeb612-ba56-50aa-871a-110a553f3339"
2733og_id : " 769b3333-4cde-544c-a081-ef9a75dddd24"
2834testing_pr : 4300
29- testing_sha : 6f611f8b243d9f4bd642573fe1420dc9eaa48c85
35+ testing_sha : a76f00b606fa3c31f78cd88d45c3350789b4a17e
0 commit comments