Skip to content

Commit 944e50b

Browse files
[PR #3058] changed rule: Cloud storage impersonation with credential theft indicators
1 parent d2734c4 commit 944e50b

File tree

1 file changed

+68
-0
lines changed

1 file changed

+68
-0
lines changed
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
name: "Cloud storage impersonation with credential theft indicators"
2+
description: "Detects messages impersonating cloud storage services that contain hyperlinked images leading to free file hosts, where message screenshots reveal high-confidence credential theft language and storage-related urgency tactics."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and length(body.current_thread.text) > 120
8+
and (
9+
0 < length(body.links) < 8
10+
and any([subject.subject, sender.display_name],
11+
regex.icontains(., "(?:cloud|storage|mailbox)")
12+
)
13+
)
14+
and (
15+
any(file.explode(beta.message_screenshot()),
16+
any(ml.nlu_classifier(.scan.ocr.raw).intents,
17+
.name == "cred_theft" and .confidence == "high"
18+
)
19+
and regex.icontains(.scan.ocr.raw,
20+
"storage.{0,50}full",
21+
"free.{0,50}upgrade",
22+
"storage.{0,50}details",
23+
"storage.{0,50}quot",
24+
"(?:mailbox|cloud|account).{0,50}disabled",
25+
"(?:email|cloud|total).{0,50}storage"
26+
)
27+
and not strings.ilike(.scan.ocr.raw, "*free plan*")
28+
)
29+
)
30+
and (
31+
any(body.links,
32+
// fingerprints of a hyperlinked image
33+
.display_text is null
34+
and .display_url.url is null
35+
and (
36+
.href_url.domain.root_domain in $free_file_hosts
37+
or .href_url.domain.root_domain == "beehiiv.com"
38+
)
39+
)
40+
)
41+
42+
// and the sender is not from high trust sender root domains
43+
and (
44+
(
45+
sender.email.domain.root_domain in $high_trust_sender_root_domains
46+
and not headers.auth_summary.dmarc.pass
47+
)
48+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
49+
)
50+
attack_types:
51+
- "Credential Phishing"
52+
tactics_and_techniques:
53+
- "Free file host"
54+
- "Image as content"
55+
- "Impersonation: Brand"
56+
- "Social engineering"
57+
detection_methods:
58+
- "Computer Vision"
59+
- "Content analysis"
60+
- "Header analysis"
61+
- "Natural Language Understanding"
62+
- "Optical Character Recognition"
63+
- "Sender analysis"
64+
- "URL analysis"
65+
id: "6c17535b-9ad1-5417-918e-f6dc344bdd92"
66+
og_id: "4c20f72c-0045-518c-8157-7dad5f196ecc"
67+
testing_pr: 3058
68+
testing_sha: 88b41e5d0b1ed305acb79d64ab160c195ec1653c

0 commit comments

Comments
 (0)