Free subdomain link with credential theft indicators

Message contains a suspicious Recipients pattern, a link that uses a free subdomain provider, and has credential theft language on the linked page.

Sublime rule (View on GitHub)

 1name: "Free subdomain link with credential theft indicators"
 2description: |
 3    Message contains a suspicious Recipients pattern, a link that uses a free subdomain provider, and has credential theft language on the linked page.
 4type: "rule"
 5severity: "high"
 6source: |
 7  type.inbound
 8  and any(body.links,
 9          .href_url.domain.root_domain in $free_subdomain_hosts
10          and .href_url.domain.subdomain is not null
11          and .href_url.domain.subdomain != "www"
12  )
13  and (
14    (
15      (
16        length(recipients.to) == 0
17        or all(recipients.to, .display_name == "Undisclosed recipients")
18      )
19      and length(recipients.cc) == 0
20      and length(recipients.bcc) == 0
21    )
22    or (
23      length(recipients.to) == 1
24      and any(recipients.to, .email.email == sender.email.email)
25    )
26    or (
27      length(recipients.to) == 0
28      and length(recipients.cc) == 0
29      and length(recipients.bcc) > 0
30    )
31  )
32  and any(body.links,
33          any(file.explode(ml.link_analysis(.).screenshot),
34              any(ml.nlu_classifier(.scan.ocr.raw).intents,
35                  .name == "cred_theft" and .confidence != "low"
36              )
37          )
38  )  
39tags:
40  - "Attack surface reduction"
41attack_types:
42  - "Credential Phishing"
43tactics_and_techniques:
44  - "Free subdomain host"
45detection_methods:
46  - "Content analysis"
47  - "Header analysis"
48  - "Natural Language Understanding"
49  - "Optical Character Recognition"
50  - "URL analysis"
51  - "URL screenshot"
52id: "9187479c-8941-5f28-88fe-0735fd2a86bc"

Related rules

to-top