Skip to content

Commit b286724

Browse files
[Shared Samples] [PR #4139] modified rule: PR# 4139 - BEC/Fraud: Urgent language and suspicious sending/infrastructure patterns
1 parent de59ece commit b286724

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

detection-rules/4139_bec_urgent_suspicious_patterns.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ source: |
2525
strings.ilike(subject.subject, '*quick question*'),
2626
2727
// brand name
28-
regex.icontains(body.current_thread.text, 'a\s?m\s?a\s?z\s?o\s?n'), // Catches "Amaz on", "Amazon", etc.
28+
regex.icontains(body.current_thread.text, 'a\s?m\s?a\s?z\s?[o0]\s?n'), // Catches "Amaz on", "Amazon", etc.
2929
regex.icontains(body.current_thread.text, 'p\s?a\s?y\s?p\s?a\s?l'),
3030
regex.icontains(body.current_thread.text, 'a\s?p\s?p\s?l\s?e'),
3131
@@ -40,7 +40,7 @@ source: |
4040
4141
// suspicious recipient pattern
4242
any(recipients.to, strings.ilike(.display_name, 'undisclosed?recipients')),
43-
length(recipients.to) == 1, // Single recipient
43+
length(recipients.to) <= 1, // Single or 0 recipients
4444
4545
// header checks
4646
strings.starts_with(headers.mailer, 'Open-Xchange Mailer'),

0 commit comments

Comments
 (0)