Abuse: Robinhood injected content
Detects messages from Robinhood with injected HTML into one of the list fields, often the 'Device' field.
Sublime rule (View on GitHub)
1name: "Abuse: Robinhood injected content"
2description: "Detects messages from Robinhood with injected HTML into one of the list fields, often the 'Device' field."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and sender.email.email == "noreply@robinhood.com"
8 and any(html.xpath(body.html, '//div/ul[count(li) = 4]/li').nodes,
9 length(.raw) > 500 and strings.count(.raw, "</") > 10
10 )
11attack_types:
12 - "Credential Phishing"
13tactics_and_techniques:
14 - "Impersonation: Brand"
15 - "Social engineering"
16detection_methods:
17 - "Content analysis"
18 - "Header analysis"
19 - "HTML analysis"
20 - "Sender analysis"
21id: "4ada5d76-9327-538e-9ebc-31e63dfcc252"