Skip to content

Commit d96760b

Browse files
[PR #3058] modified rule: Cloud storage impersonation with credential theft indicators
1 parent cd258d3 commit d96760b

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

detection-rules/3058_credential_theft_cloud_storage_impersonation.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,11 @@ type: "rule"
44
severity: "medium"
55
source: |
66
type.inbound
7+
and length(body.current_thread.text) > 120
78
and (
89
0 < length(body.links) < 8
910
and any([subject.subject, sender.display_name],
10-
regex.icontains(., "cloud|storage|mailbox")
11+
regex.icontains(., "(?:cloud|storage|mailbox)")
1112
)
1213
)
1314
and (
@@ -20,8 +21,8 @@ source: |
2021
"free.{0,50}upgrade",
2122
"storage.{0,50}details",
2223
"storage.{0,50}quot",
23-
"mailbox|cloud|account.{0,50}disabled",
24-
"email|cloud|total.{0,50}storage"
24+
"(?:mailbox|cloud|account).{0,50}disabled",
25+
"(?:email|cloud|total).{0,50}storage"
2526
)
2627
and not strings.ilike(.scan.ocr.raw, "*free plan*")
2728
)
@@ -46,7 +47,6 @@ source: |
4647
)
4748
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
4849
)
49-
5050
attack_types:
5151
- "Credential Phishing"
5252
tactics_and_techniques:
@@ -65,4 +65,4 @@ detection_methods:
6565
id: "6c17535b-9ad1-5417-918e-f6dc344bdd92"
6666
og_id: "4c20f72c-0045-518c-8157-7dad5f196ecc"
6767
testing_pr: 3058
68-
testing_sha: 2a169bed7ef257e4db513e458aaf0423fdd5b4e9
68+
testing_sha: 2c81054d443a1adf48d852d477b1940b815376db

0 commit comments

Comments
 (0)