Skip to content

Commit 26c01fd

Browse files
[Test Rules] [PR #4300] modified rule: Attachment: Callback scam file extension
1 parent c5b5e9d commit 26c01fd

1 file changed

Lines changed: 16 additions & 10 deletions

File tree

detection-rules/4300_callback_scam_file_extension.yml

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,24 @@ type: "rule"
44
severity: "medium"
55
source: |
66
type.inbound
7-
and (body.current_thread.text is null or length(body.current_thread.text) < 500)
7+
and length(body.current_thread.text) < 2000
88
and any(attachments,
9-
(.file_extension in~ ("ppt", "pptx"))
10-
and (
11-
any(file.explode(.),
12-
any(ml.nlu_classifier(.scan.strings.raw).intents,
13-
.name == "callback_scam" and .confidence != "low"
14-
)
15-
)
9+
.file_extension in~ ("ppt", "pptx")
10+
and any(file.explode(.),
11+
any(ml.nlu_classifier(.scan.strings.raw).intents,
12+
.name == "callback_scam" and .confidence != "low"
13+
)
1614
)
1715
)
18-
and not sender.email.domain.root_domain in $high_trust_sender_root_domains
16+
and sender.email.domain.root_domain in $free_email_providers
17+
// negate highly trusted sender domains unless they fail DMARC authentication
18+
and (
19+
coalesce(sender.email.domain.root_domain in $high_trust_sender_root_domains
20+
and not headers.auth_summary.dmarc.pass,
21+
false
22+
)
23+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
24+
)
1925
attack_types:
2026
- "Callback Phishing"
2127
tactics_and_techniques:
@@ -26,4 +32,4 @@ detection_methods:
2632
id: "17aeb612-ba56-50aa-871a-110a553f3339"
2733
og_id: "769b3333-4cde-544c-a081-ef9a75dddd24"
2834
testing_pr: 4300
29-
testing_sha: 6f611f8b243d9f4bd642573fe1420dc9eaa48c85
35+
testing_sha: a76f00b606fa3c31f78cd88d45c3350789b4a17e

0 commit comments

Comments
 (0)