File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ name : " PR# 4375 - Brand impersonation: Microsoft Teams"
2+ description : |
3+ Impersonation of a Microsoft Teams message.
4+ type : " rule"
5+ severity : " high"
6+ source : |
7+ type.inbound
8+ and length(filter(attachments,
9+ .file_type in $file_types_images or .file_type == "pdf"
10+ )
11+ ) < 10
12+ and (
13+ regex.icontains(body.current_thread.text,
14+ 'trying to reach you.*microsoft teams',
15+ 'new message in teams'
16+ )
17+ or any(attachments,
18+ (.file_type in $file_types_images or .file_type == "pdf")
19+ and any(file.explode(.),
20+ regex.icontains(.scan.ocr.raw,
21+ "trying to reach you.*microsoft teams"
22+ )
23+ )
24+ )
25+ )
26+ // not sent via legitimate Microsoft infra
27+ and not strings.ends_with(headers.message_id, '@odspnotify>')
28+ and not (
29+ sender.email.domain.root_domain in (
30+ "microsoft.com",
31+ "microsoftsupport.com",
32+ "office.com"
33+ )
34+ and coalesce(headers.auth_summary.dmarc.pass, false)
35+ )
36+
37+ attack_types :
38+ - " Credential Phishing"
39+ tactics_and_techniques :
40+ - " Impersonation: Brand"
41+ - " Social engineering"
42+ detection_methods :
43+ - " Content analysis"
44+ - " File analysis"
45+ - " Optical Character Recognition"
46+ - " Sender analysis"
47+ id : " 7fafff75-abd3-5b8c-879f-b26b269ad768"
48+ tags :
49+ - created_from_open_prs
50+ - rule_status_modified
51+ - pr_author_markmsublime
52+ references :
53+ - https://github.com/sublime-security/sublime-rules/pull/4375
You can’t perform that action at this time.
0 commit comments