Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
37 changes: 26 additions & 11 deletions detection-rules/impersonation_microsoft_teams.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,19 +9,34 @@ source: |
.file_type in $file_types_images or .file_type == "pdf"
)
) < 10
and any(attachments,
(.file_type in $file_types_images or .file_type == "pdf")
and any(file.explode(.),
regex.icontains(.scan.ocr.raw,
"trying to reach you.*microsoft teams"
)
)
and (
regex.icontains(body.current_thread.text,
'trying to reach you.*microsoft teams',
'new message in teams'
)
or any(attachments,
(.file_type in $file_types_images or .file_type == "pdf")
and any(file.explode(.),
regex.icontains(.scan.ocr.raw,
"trying to reach you.*microsoft teams"
)
)
)
)
and sender.email.domain.root_domain not in (
"microsoft.com",
"microsoftsupport.com",
"office.com"
// not sent via legitimate Microsoft infra
and not strings.ends_with(headers.message_id, '@odspnotify>')
and not (
sender.email.domain.root_domain in (
"microsoft.com",
"microsoftsupport.com",
"office.com",
"mail.microsoft",
"service-now.com",
"atlassian.net"
)
and coalesce(headers.auth_summary.dmarc.pass, false)
)

attack_types:
- "Credential Phishing"
tactics_and_techniques:
Expand Down
Loading