Skip to content

Commit c065024

Browse files
[Test Rules] [PR #4378] added rule: Link: Self-sent credential theft with single character path
1 parent 0599625 commit c065024

1 file changed

Lines changed: 36 additions & 0 deletions

File tree

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
name: "Link: Self-sent credential theft with single character path"
2+
description: "Detects messages sent to oneself containing links with single character paths and credential theft language, commonly used to bypass security filters and deliver malicious content."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
// self sender
8+
and length(recipients.to) == 1
9+
and (
10+
sender.email.email == recipients.to[0].email.email
11+
or recipients.to[0].email.domain.valid == false
12+
)
13+
// path contains 1 character
14+
and any(body.current_thread.links,
15+
regex.imatch(.href_url.path, '\/[A-Za-z0-9]')
16+
and .href_url.query_params is null
17+
and .href_url.fragment is null
18+
and .display_url.url is null
19+
)
20+
and any(ml.nlu_classifier(body.current_thread.text).intents,
21+
.name == "cred_theft" and .confidence != "low"
22+
)
23+
attack_types:
24+
- "Credential Phishing"
25+
tactics_and_techniques:
26+
- "Evasion"
27+
- "Social engineering"
28+
detection_methods:
29+
- "Natural Language Understanding"
30+
- "URL analysis"
31+
- "Sender analysis"
32+
- "Header analysis"
33+
id: "d47242e9-cf63-5dea-8aba-fcd6c2226b71"
34+
og_id: "c97982e6-eaa2-53e3-ba8f-0dc4db55b936"
35+
testing_pr: 4378
36+
testing_sha: 022a884f707b197a59c7d3bf6a9f4252ebf49082

0 commit comments

Comments
 (0)