Credential Phishing via Dropbox comment abuse
This rule detects Credential Phishing attacks exploiting familiar brands via Dropbox comments. These attacks originate from legitimate Dropbox infrastructure and attempt to pivot to external freemail addresses.
Sublime rule (View on GitHub)
1name: "Credential Phishing via Dropbox comment abuse"
2description: "This rule detects Credential Phishing attacks exploiting familiar brands via Dropbox comments. These attacks originate from legitimate Dropbox infrastructure and attempt to pivot to external freemail addresses."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and length(attachments) == 0
8
9 // Legitimate Dropbox sending infratructure
10 and (
11 sender.email.domain.root_domain in ('dropbox.net', 'dropbox.com')
12 // check for DMARC fail for spoofs
13 and headers.auth_summary.dmarc.pass
14 )
15
16 // Dropbox Logo or text
17 and (
18 any(ml.logo_detect(beta.message_screenshot()).brands, .name == "Dropbox")
19 or strings.contains(body.current_thread.text, "Dropbox")
20 )
21
22 // Require common brand impersonation
23 and strings.ilike(body.current_thread.text,
24 "*mcafee*",
25 "*norton*",
26 "*geek*squad*",
27 "*paypal*",
28 "*ebay*",
29 "*symantec*",
30 "*best buy*",
31 "*lifelock*",
32 "*geek*support*"
33 )
34 and 3 of (
35 strings.ilike(body.current_thread.text, '*purchase*'),
36 strings.ilike(body.current_thread.text, '*payment*'),
37 strings.ilike(body.current_thread.text, '*transaction*'),
38 strings.ilike(body.current_thread.text, '*subscription*'),
39 strings.ilike(body.current_thread.text, '*antivirus*'),
40 strings.ilike(body.current_thread.text, '*order*'),
41 strings.ilike(body.current_thread.text, '*support*'),
42 strings.ilike(body.current_thread.text, '*help line*'),
43 strings.ilike(body.current_thread.text, '*receipt*'),
44 strings.ilike(body.current_thread.text, '*invoice*'),
45 strings.ilike(body.current_thread.text, '*call*'),
46 strings.ilike(body.current_thread.text, '*cancel*'),
47 strings.ilike(body.current_thread.text, '*renew*'),
48 strings.ilike(body.current_thread.text, '*refund*'),
49 strings.ilike(body.current_thread.text, '*transfer*'),
50 strings.ilike(body.current_thread.text, '*message*')
51 )
52
53 // there's an email in the body
54 and regex.contains(body.current_thread.text,
55 "[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\\.[A-Za-z]{2,}"
56 )
57
58 // and it's likely a freemail
59 and any($free_email_providers, strings.icontains(body.current_thread.text, .))
60attack_types:
61 - "Credential Phishing"
62tactics_and_techniques:
63 - "Evasion"
64 - "Out of band pivot"
65 - "Social engineering"
66detection_methods:
67 - "Content analysis"
68 - "Computer Vision"
69 - "Sender analysis"
70
71id: "744d494d-adbf-54fe-8813-2ad7c2c6e245"