@@ -4,10 +4,11 @@ type: "rule"
4
4
severity : " medium"
5
5
source : |
6
6
type.inbound
7
+ and length(body.current_thread.text) > 120
7
8
and (
8
9
0 < length(body.links) < 8
9
10
and any([subject.subject, sender.display_name],
10
- regex.icontains(., "cloud|storage|mailbox")
11
+ regex.icontains(., "(?: cloud|storage|mailbox) ")
11
12
)
12
13
)
13
14
and (
@@ -20,8 +21,8 @@ source: |
20
21
"free.{0,50}upgrade",
21
22
"storage.{0,50}details",
22
23
"storage.{0,50}quot",
23
- "mailbox|cloud|account.{0,50}disabled",
24
- "email|cloud|total.{0,50}storage"
24
+ "(?: mailbox|cloud|account) .{0,50}disabled",
25
+ "(?: email|cloud|total) .{0,50}storage"
25
26
)
26
27
and not strings.ilike(.scan.ocr.raw, "*free plan*")
27
28
)
@@ -46,7 +47,6 @@ source: |
46
47
)
47
48
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
48
49
)
49
-
50
50
attack_types :
51
51
- " Credential Phishing"
52
52
tactics_and_techniques :
@@ -65,4 +65,4 @@ detection_methods:
65
65
id : " 6c17535b-9ad1-5417-918e-f6dc344bdd92"
66
66
og_id : " 4c20f72c-0045-518c-8157-7dad5f196ecc"
67
67
testing_pr : 3058
68
- testing_sha : 2a169bed7ef257e4db513e458aaf0423fdd5b4e9
68
+ testing_sha : 2c81054d443a1adf48d852d477b1940b815376db
0 commit comments