Skip to content

Commit 8d439f3

Browse files
[PR #3058] changed rule: Cloud storage impersonation with credential theft indicators
1 parent 5ba61d9 commit 8d439f3

File tree

1 file changed

+68
-0
lines changed

1 file changed

+68
-0
lines changed
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
name: "Cloud storage impersonation with credential theft indicators"
2+
description: "Detects messages impersonating cloud storage services that contain hyperlinked images leading to free file hosts, where message screenshots reveal high-confidence credential theft language and storage-related urgency tactics."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and (
8+
0 < length(body.links) < 8
9+
and any([subject.subject, sender.display_name],
10+
regex.icontains(., "cloud|storage|mailbox")
11+
)
12+
)
13+
and (
14+
any(file.explode(beta.message_screenshot()),
15+
any(ml.nlu_classifier(.scan.ocr.raw).intents,
16+
.name == "cred_theft" and .confidence == "high"
17+
)
18+
and regex.icontains(.scan.ocr.raw,
19+
"storage.{0,50}full",
20+
"free.{0,50}upgrade",
21+
"storage.{0,50}details",
22+
"storage.{0,50}quot",
23+
"mailbox|cloud|account.{0,50}disabled",
24+
"email|cloud|total.{0,50}storage"
25+
)
26+
and not strings.ilike(.scan.ocr.raw, "*free plan*")
27+
)
28+
)
29+
and (
30+
any(body.links,
31+
// fingerprints of a hyperlinked image
32+
.display_text is null
33+
and .display_url.url is null
34+
and (
35+
.href_url.domain.root_domain in $free_file_hosts
36+
or .href_url.domain.root_domain == "beehiiv.com"
37+
)
38+
)
39+
)
40+
41+
// and the sender is not from high trust sender root domains
42+
and (
43+
(
44+
sender.email.domain.root_domain in $high_trust_sender_root_domains
45+
and not headers.auth_summary.dmarc.pass
46+
)
47+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
48+
)
49+
50+
attack_types:
51+
- "Credential Phishing"
52+
tactics_and_techniques:
53+
- "Free file host"
54+
- "Image as content"
55+
- "Impersonation: Brand"
56+
- "Social engineering"
57+
detection_methods:
58+
- "Computer Vision"
59+
- "Content analysis"
60+
- "Header analysis"
61+
- "Natural Language Understanding"
62+
- "Optical Character Recognition"
63+
- "Sender analysis"
64+
- "URL analysis"
65+
id: "6c17535b-9ad1-5417-918e-f6dc344bdd92"
66+
og_id: "4c20f72c-0045-518c-8157-7dad5f196ecc"
67+
testing_pr: 3058
68+
testing_sha: 2a169bed7ef257e4db513e458aaf0423fdd5b4e9

0 commit comments

Comments
 (0)