Attachment: Calendar invite with Google redirect and invoice request
Detects calendar file attachments containing Google redirect URLs in the location field combined with invoice-related language in the message body.
Sublime rule (View on GitHub)
1name: "Attachment: Calendar invite with Google redirect and invoice request"
2description: "Detects calendar file attachments containing Google redirect URLs in the location field combined with invoice-related language in the message body."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and any(attachments,
8 (
9 .file_extension in~ ('ics')
10 or .content_type in ("application/ics", "text/calendar")
11 )
12 and regex.icontains(file.parse_text(.).text,
13 'LOCATION[^:]*:.{1,300}google\.com/url'
14 )
15 )
16 and any(ml.nlu_classifier(body.current_thread.text).topics,
17 .name == "Request to View Invoice" and .confidence == "high"
18 )
19
20attack_types:
21 - "Credential Phishing"
22 - "BEC/Fraud"
23tactics_and_techniques:
24 - "Open redirect"
25 - "Social engineering"
26detection_methods:
27 - "File analysis"
28 - "Natural Language Understanding"
29 - "URL analysis"
30id: "8ea3cff8-f2ee-5190-8530-a79beab60a3b"