Skip to content

Commit f575694

Browse files
[Test Rules] [PR #4276] modified rule: Brand impersonation: Microsoft with embedded logo and credential theft language
1 parent 2892df0 commit f575694

1 file changed

Lines changed: 7 additions & 8 deletions

File tree

detection-rules/4276_impersonation_microsoft_credential_theft.yml

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -122,14 +122,13 @@ source: |
122122
strings.icontains(subject.subject, .display_text)
123123
or .display_text == "Open"
124124
),
125-
.href_url.domain.root_domain == "mimecastprotect.com"
126-
and (
127-
any(.href_url.query_params_decoded["domain"], . == "sharepoint.com")
128-
or (
129-
any(.href_url.query_params_decoded["domain"],
125+
.href_url.domain.root_domain in (
126+
"mimecastprotect.com",
127+
"mimecast.com"
128+
)
129+
and any(.href_url.query_params_decoded["domain"],
130130
strings.parse_domain(.).tld == "ms"
131-
)
132-
)
131+
or strings.parse_domain(.).root_domain == "sharepoint.com"
133132
)
134133
)
135134
)
@@ -156,4 +155,4 @@ detection_methods:
156155
id: "a7baaf42-c489-59b7-bd34-8deaef1c3d6d"
157156
og_id: "3ee9ef3d-8ec4-5df0-a8a2-5c6d037eb17a"
158157
testing_pr: 4276
159-
testing_sha: 26bfeb8a95c298edde3d71cb77dfefc566d060ee
158+
testing_sha: cd951f0dbe235766ea70bf66f61211986a3aefd1

0 commit comments

Comments
 (0)