Skip to content

Commit 7d956f1

Browse files
[PR #3038] changed rule: Link: PDF display text to free file host from unknown sender
1 parent 37ba8fe commit 7d956f1

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
name: "Link: PDF display text to free file host from unknown sender"
2+
description: "Detects messages containing a single link with PDF-named display text that redirects to a free file hosting service, sent from unknown or free email providers without previous message threads."
3+
type: "rule"
4+
severity: "high"
5+
source: |
6+
type.inbound
7+
// the display_text ends in .pdf and goes to a free file host
8+
and any(body.links,
9+
strings.iends_with(.display_text, '.pdf')
10+
and .href_url.domain.domain in $free_file_hosts
11+
)
12+
// there is only a single link to the free file host
13+
and length(filter(body.links, .href_url.domain.domain in $free_file_hosts)) == 1
14+
// the sender is not well known, or is from free mail
15+
and (
16+
sender.email.domain.root_domain not in $tranco_1m
17+
or sender.email.domain.root_domain in $free_email_providers
18+
or sender.email.domain.root_domain == "onmicrosoft.com"
19+
)
20+
// the message does not contain previous threads
21+
and length(body.previous_threads) == 0
22+
23+
attack_types:
24+
- "Credential Phishing"
25+
tactics_and_techniques:
26+
- "Free file host"
27+
- "Free email provider"
28+
- "Social engineering"
29+
detection_methods:
30+
- "Content analysis"
31+
- "Sender analysis"
32+
- "URL analysis"
33+
id: "9f5a2a0c-2b99-5b2a-a24f-47988425ced4"
34+
og_id: "b010740b-a462-5dcd-acf9-877783a84534"
35+
testing_pr: 3038
36+
testing_sha: a04c9c50aa45ea9c7552e64b64b93a2ff55f36f8

0 commit comments

Comments
 (0)