@@ -12,11 +12,12 @@ source: |
12
12
)
13
13
and not (
14
14
(
15
- // legitimate salesforce domains
15
+ // legitimate domains
16
16
sender.email.domain.root_domain in (
17
17
"salesforce.com",
18
18
"salesforceventures.com",
19
- "tangocard.com" //https://www.tangocard.com/salesforce-partnership
19
+ "tangocard.com", //https://www.tangocard.com/salesforce-partnership
20
+ "elevatesalesforce.com" // unrelated but name in domain
20
21
)
21
22
and headers.auth_summary.dmarc.pass
22
23
)
@@ -31,15 +32,10 @@ source: |
31
32
// email from own domain with salesforce notification
32
33
or (
33
34
sender.email.domain.root_domain in $org_domains
34
- and headers.auth_summary.dmarc.pass
35
- )
36
- )
37
- and (
38
- not (
39
- coalesce(headers.auth_summary.dmarc.pass, false)
40
- and not profile.by_sender().solicited
35
+ and not headers.auth_summary.dmarc.pass
41
36
)
42
37
)
38
+ and not profile.by_sender().solicited
43
39
and not any(body.links, .href_url.domain.root_domain == "salesforce.com")
44
40
// negate highly trusted sender domains unless they fail DMARC authentication
45
41
and (
@@ -48,8 +44,7 @@ source: |
48
44
and not headers.auth_summary.dmarc.pass
49
45
)
50
46
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
51
- )
52
-
47
+ )
53
48
54
49
attack_types :
55
50
- " Credential Phishing"
@@ -64,4 +59,4 @@ detection_methods:
64
59
id : " c5f0e666-81f0-5d17-a470-12ab75113631"
65
60
og_id : " 736dfb87-1f99-5cdb-aefc-392257376f3d"
66
61
testing_pr : 3050
67
- testing_sha : 036043c2825d5b375dc3917cddf13913200cdb52
62
+ testing_sha : ff724dc18f69435fa4f8de270bafd0bf9fad3f2b
0 commit comments