Skip to content

Commit 5ae3df0

Browse files
[Test Rules] [PR #4367] modified rule: Link: Cloud service with credential theft language
1 parent 3085555 commit 5ae3df0

1 file changed

Lines changed: 7 additions & 2 deletions

File tree

detection-rules/4367_link_credential_phishing_cloud_service.yml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,12 @@ source: |
2020
and all(body.links,
2121
.href_url.domain.root_domain != sender.email.domain.root_domain
2222
)
23-
23+
// negate legit cloud companies
24+
and not (
25+
sender.email.domain.root_domain in ("cloud-cme.com", "cloudcounting.online")
26+
// check for SPF or DMARC passed
27+
and (headers.auth_summary.spf.pass or headers.auth_summary.dmarc.pass)
28+
)
2429
attack_types:
2530
- "Credential Phishing"
2631
tactics_and_techniques:
@@ -33,4 +38,4 @@ detection_methods:
3338
id: "a096a1cc-6777-55c3-92be-b45aa1b58513"
3439
og_id: "5f1395a6-e2ae-5175-ad29-5f35111219fd"
3540
testing_pr: 4367
36-
testing_sha: 57bb943caa5ef2f01f910e5f009ba16eeccc6c66
41+
testing_sha: 7bd6db9f21f3ed6be98fc084b3baf4185550c36a

0 commit comments

Comments
 (0)