Skip to content

Commit c310934

Browse files
zoomequipdID GeneratorIndiaAce
authored
Create link_single_riddle.yml (#3037)
Co-authored-by: ID Generator <[email protected]> Co-authored-by: Luke Wescott <[email protected]>
1 parent 944c5d0 commit c310934

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
name: "Link: Direct link to riddle.com hosted showcase"
2+
description: "Message contains a single link to a Riddle.com hosted showcase which has been observed abused for credential phishing landing"
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and length(body.links) < 20
8+
and any(body.links,
9+
.href_url.domain.root_domain == "riddle.com"
10+
)
11+
and length(filter(body.links,
12+
.href_url.domain.root_domain == "riddle.com"
13+
and strings.istarts_with(.href_url.path, '/view/')
14+
)
15+
) == 1
16+
// negate highly trusted sender domains unless they fail DMARC authentication
17+
and (
18+
(
19+
sender.email.domain.root_domain in $high_trust_sender_root_domains
20+
and not headers.auth_summary.dmarc.pass
21+
)
22+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
23+
)
24+
and not profile.by_sender_email().any_messages_benign
25+
tags:
26+
- "Attack surface reduction"
27+
attack_types:
28+
- "Credential Phishing"
29+
tactics_and_techniques:
30+
- "Free file host"
31+
detection_methods:
32+
- "Sender analysis"
33+
- "URL analysis"
34+
- "Header analysis"
35+
id: "cca7d2f5-421f-5421-ae13-da5588c15c8b"

0 commit comments

Comments
 (0)