O365 Email Reported by User as Malware or Phish

Detects the occurrence of emails reported as Phishing or Malware by Users. Security Awareness training is essential to stay ahead of scammers and threat actors, as security products can be bypassed, and the user can still receive a malicious message. Educating users to report suspicious messages can help identify gaps in security controls and prevent malware infections and Business Email Compromise attacks.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2022/01/12"
 3integration = ["o365"]
 4maturity = "production"
 5updated_date = "2024/05/21"
 6
 7[rule]
 8author = ["Elastic"]
 9description = """
10Detects the occurrence of emails reported as Phishing or Malware by Users. Security Awareness training is essential to
11stay ahead of scammers and threat actors, as security products can be bypassed, and the user can still receive a
12malicious message. Educating users to report suspicious messages can help identify gaps in security controls and prevent
13malware infections and Business Email Compromise attacks.
14"""
15false_positives = ["Legitimate files reported by the users"]
16from = "now-30m"
17index = ["filebeat-*", "logs-o365*"]
18language = "kuery"
19license = "Elastic License v2"
20name = "O365 Email Reported by User as Malware or Phish"
21note = """## Setup
22
23The Office 365 Logs Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
24references = [
25    "https://support.microsoft.com/en-us/office/use-the-report-message-add-in-b5caa9f1-cdf3-4443-af8c-ff724ea719d2?ui=en-us&rs=en-us&ad=us",
26]
27risk_score = 47
28rule_id = "5930658c-2107-4afc-91af-e0e55b7f7184"
29severity = "medium"
30tags = ["Domain: Cloud", "Data Source: Microsoft 365", "Tactic: Initial Access"]
31timestamp_override = "event.ingested"
32type = "query"
33
34query = '''
35event.dataset:o365.audit and event.provider:SecurityComplianceCenter and event.action:AlertTriggered and rule.name:"Email reported by user as malware or phish"
36'''
37
38
39[[rule.threat]]
40framework = "MITRE ATT&CK"
41[[rule.threat.technique]]
42id = "T1566"
43name = "Phishing"
44reference = "https://attack.mitre.org/techniques/T1566/"
45[[rule.threat.technique.subtechnique]]
46id = "T1566.001"
47name = "Spearphishing Attachment"
48reference = "https://attack.mitre.org/techniques/T1566/001/"
49
50[[rule.threat.technique.subtechnique]]
51id = "T1566.002"
52name = "Spearphishing Link"
53reference = "https://attack.mitre.org/techniques/T1566/002/"
54
55
56
57[rule.threat.tactic]
58id = "TA0001"
59name = "Initial Access"
60reference = "https://attack.mitre.org/tactics/TA0001/"

Setup

The Office 365 Logs Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

References

Related rules

to-top