Skip to content

Commit d666a31

Browse files
[Test Rules] [PR #4378] modified rule: Link: Single character path with credential theft body and self sender behavior or invalid recipient
1 parent 398e3ae commit d666a31

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

detection-rules/4378_self_sender_cred_theft_short_path_link.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
name: "Link: Single character path with credential theft body and self sender behavior"
2-
description: "Detects messages sent to oneself containing links with single character paths and credential theft language, commonly used to bypass security filters and deliver malicious content."
1+
name: "Link: Single character path with credential theft body and self sender behavior or invalid recipient"
2+
description: "Message where the sender and recipient are the same or the recipient domain is invalid, contains a link with a single character path and no query parameters or fragments, and includes credential theft language."
33
type: "rule"
44
severity: "medium"
55
source: |
66
type.inbound
7-
// self sender
7+
// self sender or invaild recipent domain
88
and length(recipients.to) == 1
99
and (
1010
sender.email.email == recipients.to[0].email.email
@@ -33,4 +33,4 @@ detection_methods:
3333
id: "d47242e9-cf63-5dea-8aba-fcd6c2226b71"
3434
og_id: "c97982e6-eaa2-53e3-ba8f-0dc4db55b936"
3535
testing_pr: 4378
36-
testing_sha: 59f582fb35011591b4ebd4d1aed2ad835752d616
36+
testing_sha: 5cdf4ccb8f79ce2981c046a3b286a2e63632fcc0

0 commit comments

Comments
 (0)