Skip to content

Commit 03c02a7

Browse files
[PR #3066] changed rule: Attachment: Fictitious invoice using LinkedIn's address
1 parent f7107f8 commit 03c02a7

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
name: "Attachment: Fictitious invoice using LinkedIn's address"
2+
description: "Detects PDF attachments created with wkhtmltopdf or Qt that contain LinkedIn's headquarters address (1000 W Maude Ave) in financial communications context, but do not mention LinkedIn itself."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and 0 < length(filter(attachments, .file_type == "pdf")) < 3
8+
and any(filter(attachments,
9+
.file_type == "pdf"
10+
// creator and producer of PDF seen in malicious content
11+
and (
12+
strings.starts_with(beta.parse_exif(.).creator, "wkhtmltopdf")
13+
or strings.starts_with(beta.parse_exif(.).producer, "Qt ")
14+
)
15+
),
16+
any(filter(file.explode(.), .scan.ocr.raw is not null),
17+
// contains LinkedIn HQ address but not from LinkedIn
18+
(
19+
strings.icontains(.scan.ocr.raw, "1000 W Maude Ave")
20+
and any(beta.ml_topic(body.current_thread.text).topics,
21+
.name == "Financial Communications"
22+
and .confidence != "low"
23+
)
24+
and not strings.icontains(.scan.ocr.raw, "linkedin")
25+
),
26+
)
27+
)
28+
29+
attack_types:
30+
- "BEC/Fraud"
31+
tactics_and_techniques:
32+
- "PDF"
33+
- "Social engineering"
34+
detection_methods:
35+
- "File analysis"
36+
- "Optical Character Recognition"
37+
- "Natural Language Understanding"
38+
- "Content analysis"
39+
- "Exif analysis"
40+
id: "3ac17683-1e26-5865-8ddb-116a1a620d77"
41+
og_id: "aeee3d9f-4b34-5b56-9ac7-81dc3d344489"
42+
testing_pr: 3066
43+
testing_sha: 733b4b93d0aff1a02126249cdde51f4c370cdf02

0 commit comments

Comments
 (0)