Fake scan-to-email message

Message resembles an email from a scan-to-email service or device, but does not contain any attachments, instead linking to an unknown domain.

Sublime rule (View on GitHub)

 1name: "Fake scan-to-email message"
 2description: "Message resembles an email from a scan-to-email service or device, but does not contain any attachments, instead linking to an unknown domain."
 3type: "rule"
 4severity: "medium"
 5source: |
 6  type.inbound
 7  and length(attachments) == 0
 8  and 0 < length(body.links) < 3
 9  and strings.ilike(subject.subject, "*message from*")
10  and (
11    (
12      strings.ilike(body.current_thread.text, "*scan date*", "*was sent from*")
13      and not strings.ilike(body.current_thread.text, "*unmonitored*")
14    )
15    or any(file.explode(beta.message_screenshot()),
16           strings.ilike(.scan.ocr.raw, "*scan date*", "*was sent from*")
17           and not strings.ilike(.scan.ocr.raw, "*unmonitored*")
18    )
19  )
20  and (
21    any(body.links, .href_url.domain.root_domain in~ $free_file_hosts)
22    or any(body.links, .display_url.url != .href_url.url)
23    or any(body.links, .display_url.url is null)
24  )
25  and all(body.links,
26          .href_url.domain.domain not in~ $org_domains
27          and .href_url.domain.domain not in ("aka.ms")
28  )
29  and sender.email.domain.domain not in~ $org_domains
30  and (
31    not profile.by_sender().solicited
32    or (
33      profile.by_sender().any_messages_malicious_or_spam
34      and not profile.by_sender().any_false_positives
35    )
36  )
37  and not profile.by_sender().any_false_positives  
38
39attack_types:
40  - "Credential Phishing"
41tactics_and_techniques:
42  - "Free file host"
43  - "Social engineering"
44detection_methods:
45  - "Content analysis"
46  - "Optical Character Recognition"
47  - "Sender analysis"
48  - "URL analysis"
49id: "78851fbe-9481-5fda-b472-f0b8dfb35e1a"
to-top