Skip to content

Commit b79b140

Browse files
[Shared Samples] [PR #4300] modified rule: PR# 4300 - Attachment: Callback scam file extension
1 parent 432b450 commit b79b140

1 file changed

Lines changed: 15 additions & 9 deletions

File tree

detection-rules/4300_callback_scam_file_extension.yml

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,24 @@ type: "rule"
44
severity: "medium"
55
source: |
66
type.inbound
7-
and (body.current_thread.text is null or length(body.current_thread.text) < 500)
7+
and length(body.current_thread.text) < 2000
88
and any(attachments,
9-
(.file_extension in~ ("ppt", "pptx"))
10-
and (
11-
any(file.explode(.),
12-
any(ml.nlu_classifier(.scan.strings.raw).intents,
13-
.name == "callback_scam" and .confidence != "low"
14-
)
15-
)
9+
.file_extension in~ ("ppt", "pptx")
10+
and any(file.explode(.),
11+
any(ml.nlu_classifier(.scan.strings.raw).intents,
12+
.name == "callback_scam" and .confidence != "low"
13+
)
1614
)
1715
)
18-
and not sender.email.domain.root_domain in $high_trust_sender_root_domains
16+
and sender.email.domain.root_domain in $free_email_providers
17+
// negate highly trusted sender domains unless they fail DMARC authentication
18+
and (
19+
coalesce(sender.email.domain.root_domain in $high_trust_sender_root_domains
20+
and not headers.auth_summary.dmarc.pass,
21+
false
22+
)
23+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
24+
)
1925
attack_types:
2026
- "Callback Phishing"
2127
tactics_and_techniques:

0 commit comments

Comments
 (0)