Google Drive abuse: Credential phishing link
This rule detects legitimate Google Drive shares that link to files on Google Drive that host credential phishing content.
The file is usually a PDF that impersonates a legitimate brand, with credential theft language, and a button or link to an external site that steals login credentials.
Sublime rule (View on GitHub)
1name: "Google Drive abuse: Credential phishing link"
2description: |
3 This rule detects legitimate Google Drive shares that link to files on Google Drive that host credential phishing content.
4
5 The file is usually a PDF that impersonates a legitimate brand, with credential theft language, and a button or link to an external site that steals login credentials.
6type: "rule"
7severity: "high"
8source: |
9 type.inbound
10 and sender.email.email in (
11 "drive-shares-dm-noreply@google.com",
12 "drive-shares-noreply@google.com"
13 )
14
15 // malicious observed shares don't include the google "Added you as an editor" phrase.
16 // allowing user edits to a malicous document could neuter the threat
17 and not strings.contains(body.current_thread.text, "added you as an editor")
18 and any(filter(body.links,
19 .href_url.domain.domain != "support.google.com"
20 and .display_text == "Open"
21 ),
22 (
23 (
24 ml.link_analysis(., mode="aggressive").credphish.disposition == "phishing"
25 )
26 and length(ml.logo_detect(ml.link_analysis(., mode="aggressive").screenshot
27 ).brands
28 ) > 0
29 )
30 or any(file.explode(ml.link_analysis(.).screenshot),
31 (
32 any(ml.nlu_classifier(.scan.ocr.raw).intents,
33 .name == "cred_theft" and .confidence in ("medium", "high")
34 )
35 and (
36 length(ml.logo_detect(ml.link_analysis(..).screenshot).brands
37 ) > 0
38 and ml.link_analysis(..).credphish.disposition == "phishing"
39 )
40 )
41 and not ml.link_analysis(..).effective_url.domain.domain == "accounts.google.com"
42 // standard Google Docs error
43 and not strings.contains(.scan.ocr.raw,
44 "encountered an error. Please try reloading this page"
45 )
46 )
47 )
48
49attack_types:
50 - "Credential Phishing"
51tactics_and_techniques:
52 - "Free file host"
53 - "Impersonation: Brand"
54detection_methods:
55 - "Computer Vision"
56 - "Natural Language Understanding"
57 - "Optical Character Recognition"
58 - "Sender analysis"
59 - "URL analysis"
60 - "URL screenshot"
61id: "c74aece0-b8ac-53bc-861f-ac28a419a345"