Skip to content

Commit e75f025

Browse files
[PR #3051] changed rule: SVG file reference with free file hosting from non-freemail sender
1 parent 1f419c5 commit e75f025

File tree

1 file changed

+54
-0
lines changed

1 file changed

+54
-0
lines changed
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
name: "SVG file reference with free file hosting from non-freemail sender"
2+
description: "Detects messages containing SVG file references in links, body text, subject, or sender display name, combined with links to free file hosting services from non-freemail domains where the linked domains don't match the sender's domain."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
// length of body links is greater than 0
8+
and length(body.links) > 0
9+
10+
// sender is not freemail
11+
and sender.email.domain.root_domain not in $free_email_providers
12+
13+
// and no body links match the sender's domain
14+
and all(body.links,
15+
.href_url.domain.root_domain != sender.email.domain.root_domain
16+
)
17+
// .svg found either in the body links or in the body text, or in certain header fields (subject, display name)
18+
and (
19+
any(body.links, strings.ilike(.display_text, "*.svg*"))
20+
or (strings.icontains(body.current_thread.text, ".svg"))
21+
or any([subject.subject, sender.display_name], strings.icontains(., '.svg'))
22+
)
23+
// any body links are in $free_file_hosts
24+
and any(body.links,
25+
(
26+
.href_url.domain.domain in $free_file_hosts
27+
or .href_url.domain.root_domain in $free_file_hosts
28+
)
29+
// remove free_file_hosts used to host images as links
30+
and not any($file_types_images,
31+
strings.iends_with(..href_url.url, strings.concat('.', .))
32+
)
33+
)
34+
and not (
35+
strings.icontains(body.current_thread.text, "Modify my alert settings")
36+
or strings.icontains(body.current_thread.text, "Requested resource")
37+
or strings.icontains(body.current_thread.text, "against company policy")
38+
)
39+
40+
attack_types:
41+
- "Credential Phishing"
42+
- "Malware/Ransomware"
43+
tactics_and_techniques:
44+
- "Free file host"
45+
- "Evasion"
46+
detection_methods:
47+
- "Content analysis"
48+
- "Header analysis"
49+
- "Sender analysis"
50+
- "URL analysis"
51+
id: "1f66ce88-3222-5200-8e07-e7d758917de4"
52+
og_id: "13c1bb93-f4b8-5ba1-b49b-5783eda7dca0"
53+
testing_pr: 3051
54+
testing_sha: e87d72469ffee30ab018348f48aeb83447cd5df8

0 commit comments

Comments
 (0)