Skip to content

Commit ea9aef3

Browse files
[PR #3483] added rule: Brand impersonation: Microsoft Teams
1 parent a67ef43 commit ea9aef3

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
name: "Brand impersonation: Microsoft Teams"
2+
description: |
3+
Impersonation of a Microsoft Teams message.
4+
type: "rule"
5+
severity: "high"
6+
source: |
7+
type.inbound
8+
and (
9+
(
10+
0 < length(filter(attachments,
11+
.file_type in $file_types_images or .file_type == "pdf"
12+
)
13+
) < 10
14+
)
15+
or (
16+
length(filter(attachments,
17+
.file_extension == "ics" or .content_type == "text/calendar"
18+
)
19+
) == 1
20+
)
21+
)
22+
and any(attachments,
23+
(
24+
(.file_type in $file_types_images or .file_type == "pdf")
25+
and any(file.explode(.),
26+
regex.icontains(.scan.ocr.raw,
27+
"trying to reach you.*microsoft teams",
28+
"microsoft teams.*meeting (recording|event)"
29+
)
30+
)
31+
)
32+
or (
33+
(.file_extension == "ics" or .content_type == "text/calendar")
34+
and any(file.explode(.),
35+
regex.icontains(.scan.strings.raw,
36+
"trying to reach you.*microsoft teams",
37+
"microsoft teams.*meeting (recording|event)"
38+
)
39+
)
40+
)
41+
)
42+
and (
43+
sender.email.domain.root_domain not in (
44+
"microsoft.com",
45+
"microsoftsupport.com",
46+
"office.com"
47+
)
48+
or not sender.email.domain.valid
49+
)
50+
attack_types:
51+
- "Credential Phishing"
52+
tactics_and_techniques:
53+
- "Impersonation: Brand"
54+
- "Social engineering"
55+
detection_methods:
56+
- "Content analysis"
57+
- "File analysis"
58+
- "Optical Character Recognition"
59+
- "Sender analysis"
60+
id: "3edd5da2-624b-5b03-9208-871f21790c47"
61+
og_id: "9cd53055-8e1a-5a45-b78f-34a62f0793dd"
62+
testing_pr: 3483
63+
testing_sha: 1b701f2cb215d34fce1036c192696359a0a91c6a

0 commit comments

Comments
 (0)