Skip to content

Commit ec0a7ec

Browse files
[Test Rules] [PR #4368] modified rule: Link: Invoice-related BEC with newly registered domain < 60 days
1 parent ebc4f06 commit ec0a7ec

1 file changed

Lines changed: 25 additions & 7 deletions

File tree

detection-rules/4368_link_previous_thread_invoice.yml

Lines changed: 25 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ source: |
88
and (
99
any(body.current_thread.links, network.whois(.href_url.domain).days_old < 60)
1010
and regex.icontains(subject.subject,
11-
'\b(fyi|attention|proposal|purchase|invoice|payment|wire|agreement|contract|settlement)\b'
11+
'\b(proposal|purchase|invoice|payment|wire|agreement|contract|settlement)\b'
1212
)
1313
and any(body.links,
1414
regex.icontains(.display_text,
15-
'[VIEW|REVIEW|CLICK|DOWNLOAD|CHECK|VALIDATE]'
15+
'(?:VIEW|REVIEW|CLICK|DOWNLOAD|CHECK|VALIDATE)'
1616
)
1717
)
1818
and any([body.current_thread.text],
@@ -29,16 +29,33 @@ source: |
2929
)
3030
)
3131
and (
32-
// language attempting to engage
33-
(
32+
any(ml.nlu_classifier(body.current_thread.text).intents,
33+
.name == "bec" and .confidence != "low"
34+
)
35+
or (
3436
any(ml.nlu_classifier(body.current_thread.text).entities,
35-
.name in ("request", "financial")
37+
.name in ("urgency", "request")
3638
)
3739
)
40+
or any(ml.nlu_classifier(body.current_thread.text).tags,
41+
.name in ("invoice", "payment")
42+
)
3843
)
3944
)
4045
// prevent benign emails
41-
and any(ml.nlu_classifier(body.current_thread.text).intents, .name != "benign")
46+
and not any(ml.nlu_classifier(body.current_thread.text).intents,
47+
.name == "benign"
48+
)
49+
// and (
50+
// (
51+
// profile.by_sender().prevalence != "common"
52+
// and not profile.by_sender().solicited
53+
// )
54+
// or (
55+
// profile.by_sender().any_messages_malicious_or_spam
56+
// and not profile.by_sender().any_messages_benign
57+
// )
58+
// )
4259
// negate highly trusted sender domains unless they fail DMARC authentication
4360
and (
4461
(
@@ -47,6 +64,7 @@ source: |
4764
)
4865
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
4966
)
67+
and not profile.by_sender().any_messages_benign
5068
5169
attack_types:
5270
- "BEC/Fraud"
@@ -61,4 +79,4 @@ detection_methods:
6179
id: "51c6b50f-7a68-5ee8-9897-510d11bc255c"
6280
og_id: "fee020b6-4a01-5ed3-a924-b5aa4415d3e9"
6381
testing_pr: 4368
64-
testing_sha: 6ec9ac8d5b7735a0e7a7083a71e8e534f983d5c1
82+
testing_sha: 0e93397c19fc459f8645002eb59dfe1640852ffc

0 commit comments

Comments
 (0)