Skip to content

Commit 9ffcb09

Browse files
authored
Update vip_impersonation_subject.yml (#3078)
1 parent f722aa7 commit 9ffcb09

File tree

1 file changed

+12
-10
lines changed

1 file changed

+12
-10
lines changed

detection-rules/vip_impersonation_subject.yml

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
name: "VIP / Executive impersonation in subject (untrusted)"
22
description: |
33
Sender subject contains the display name of a user in the $org_vips list, and the sender has never been seen before.
4-
4+
55
The $org_vips list must first be manually connected to a VIP group of your upstream provider (Google Workspace and Microsoft 365 only) in order for this rule to work.
66
Once connected, the list will be automatically synced and kept up-to-date. For more information, see the $org_vips documentation: https://docs.sublimesecurity.com/docs/configure-org_vips-list
7-
7+
88
This rule is recommended to be used on a relatively small list of VIPs, and is meant to reduce attack surface by detecting *any* message that matches the protected list of display names from a first-time or unsolicited sender.
9-
9+
1010
Additional rule logic can be added to look for suspicious subjects, suspicious links, etc.
1111
type: "rule"
1212
severity: "medium"
@@ -18,13 +18,15 @@ source: |
1818
)
1919
// not being sent to said VIP
2020
and not (
21-
length(recipients.to) == 1
22-
and all(recipients.to,
23-
any($org_vips,
24-
.email == ..email.email
25-
and strings.contains(subject.subject, .display_name)
26-
and strings.contains(.display_name, " ")
27-
)
21+
(
22+
length(recipients.to) == 1
23+
and all(recipients.to,
24+
any($org_vips,
25+
.email == ..email.email
26+
and strings.contains(subject.subject, .display_name)
27+
and strings.contains(.display_name, " ")
28+
)
29+
)
2830
)
2931
)
3032
and (

0 commit comments

Comments
 (0)