Skip to content

Commit 484c431

Browse files
[Shared Samples] [PR #4375] added rule: PR# 4375 - Brand impersonation: Microsoft Teams
1 parent 219d5c8 commit 484c431

1 file changed

Lines changed: 53 additions & 0 deletions

File tree

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
name: "PR# 4375 - Brand impersonation: Microsoft Teams"
2+
description: |
3+
Impersonation of a Microsoft Teams message.
4+
type: "rule"
5+
severity: "high"
6+
source: |
7+
type.inbound
8+
and length(filter(attachments,
9+
.file_type in $file_types_images or .file_type == "pdf"
10+
)
11+
) < 10
12+
and (
13+
regex.icontains(body.current_thread.text,
14+
'trying to reach you.*microsoft teams',
15+
'new message in teams'
16+
)
17+
or any(attachments,
18+
(.file_type in $file_types_images or .file_type == "pdf")
19+
and any(file.explode(.),
20+
regex.icontains(.scan.ocr.raw,
21+
"trying to reach you.*microsoft teams"
22+
)
23+
)
24+
)
25+
)
26+
// not sent via legitimate Microsoft infra
27+
and not strings.ends_with(headers.message_id, '@odspnotify>')
28+
and not (
29+
sender.email.domain.root_domain in (
30+
"microsoft.com",
31+
"microsoftsupport.com",
32+
"office.com"
33+
)
34+
and coalesce(headers.auth_summary.dmarc.pass, false)
35+
)
36+
37+
attack_types:
38+
- "Credential Phishing"
39+
tactics_and_techniques:
40+
- "Impersonation: Brand"
41+
- "Social engineering"
42+
detection_methods:
43+
- "Content analysis"
44+
- "File analysis"
45+
- "Optical Character Recognition"
46+
- "Sender analysis"
47+
id: "7fafff75-abd3-5b8c-879f-b26b269ad768"
48+
tags:
49+
- created_from_open_prs
50+
- rule_status_modified
51+
- pr_author_markmsublime
52+
references:
53+
- https://github.com/sublime-security/sublime-rules/pull/4375

0 commit comments

Comments
 (0)