Attachment: Adobe image lure with suspicious link from first time sender

Detects Adobe phishing messages with an Adobe logo attached, with suspicious link language from a first-time sender.

Sublime rule (View on GitHub)

 1name: "Attachment: Adobe image lure with suspicious link from first time sender"
 2description: "Detects Adobe phishing messages with an Adobe logo attached, with suspicious link language from a first-time sender."
 3type: "rule"
 4severity: "medium"
 5source: |
 6  type.inbound
 7  and length(filter(attachments, .file_type not in $file_types_images)) == 0
 8  and length(body.links) > 0
 9  and all(body.links, .display_text is null)
10  and any(attachments,
11          any(ml.logo_detect(.).brands, .name == "Adobe" and .confidence in ("high"))
12          and any(file.explode(.),
13                  strings.ilike(.scan.ocr.raw,
14                                "*review*",
15                                "*sign*",
16                                "*view*",
17                                "*completed document*",
18                                "*open agreement*"
19                  )
20          )
21  )
22  and (
23    (
24      sender.email.domain.root_domain in $free_email_providers
25      and sender.email.email not in $sender_emails
26    )
27    or (
28      sender.email.domain.root_domain not in $free_email_providers
29      and sender.email.domain.domain not in $sender_domains
30    )
31  )  
32attack_types:
33  - "Malware/Ransomware"
34tactics_and_techniques:
35  - "Image as content"
36  - "Impersonation: Brand"
37detection_methods:
38  - "Content analysis"
39  - "Computer Vision"
40  - "Optical Character Recognition"
41  - "Sender analysis"
42  - "URL analysis"
43id: "1d7add81-9822-576a-bcae-c4440e75e393"
to-top