Fake Zoho Sign template abuse
This rule captures credential phishing attempts abusing the Zoho Sign template. The rule looks for artifacts of the Hijacked Zoho link and other template constructs.
Sublime rule (View on GitHub)
1name: "Fake Zoho Sign template abuse"
2description: "This rule captures credential phishing attempts abusing the Zoho Sign template. The rule looks for artifacts of the Hijacked Zoho link and other template constructs."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7
8 and 0 < length(body.links) < 10
9 // Link contains Start Signing
10 and any(body.links, .display_text == "Start Signing")
11
12 // Zoho artifact in html body
13 and regex.contains(body.html.raw,
14 'title="Original URL: https:\/\/sign\.zoho\.com\/zsguest\?[^"]*action_type=SIGN\.[^"]*Click or tap if you trust this link\."'
15 )
16 // but the Zoho link is not active
17 and not any(body.links, .href_url.domain.root_domain == "zoho.com")
18
19 // and the body thread contains the Sender + recipient domain
20 and any(recipients.to,
21 strings.icontains(body.current_thread.text,
22 strings.concat("Sender\n", .email.domain.domain)
23 )
24 )
25
26attack_types:
27 - "Credential Phishing"
28tactics_and_techniques:
29 - "Evasion"
30 - "Open redirect"
31 - "Social engineering"
32detection_methods:
33 - "Content analysis"
34 - "HTML analysis"
35 - "URL analysis"
36id: "785fd0d5-87ef-5f0e-ad35-ecd4f2388fc0"