Brand impersonation: Microsoft

Impersonation of the Microsoft brand.

Sublime rule (View on GitHub)

  1name: "Brand impersonation: Microsoft"
  2description: |
  3    Impersonation of the Microsoft brand.
  4references:
  5  - "https://www.itproportal.com/news/cybercriminals-launch-targeted-phishing-attacks-against-microsoft-365-users/"
  6  - "https://cofense.com/blog/office-365-phishing-variant/"
  7  - "https://www.helpnetsecurity.com/2020/05/04/fake-microsoft-teams-notification/"
  8type: "rule"
  9severity: "high"
 10authors:
 11  - twitter: "amitchell516"
 12source: |
 13  type.inbound
 14  and (
 15    length(body.links) < 30
 16    or sender.email.local_part == "newsletter" and length(body.links) < 5
 17  )
 18  and (
 19    (
 20      strings.ilike(subject.subject, '*Microsoft 365*')
 21      and strings.ilike(subject.subject, '*is expired*')
 22    )
 23    or (
 24      // should catch any instance of the word "expired"
 25      strings.ilike(body.current_thread.text, "*expir*")
 26      and strings.ilike(body.current_thread.text, "*password*")
 27      and strings.ilike(body.current_thread.text, "*microsoft*")
 28    )
 29    or regex.icontains(body.current_thread.text,
 30                       ".*reach you.{0,20}Microsoft Teams"
 31    )
 32    or strings.ilike(sender.display_name, '*new activity in Teams*')
 33    or strings.icontains(strings.replace_confusables(sender.display_name),
 34                         'microsoft advertising support'
 35    )
 36    or subject.subject =~ 'Offline Message in Teams'
 37    or strings.ilike(subject.subject, '*Teams Sent A Message')
 38    or sender.display_name in~ (
 39      'Microsoft Partner Network',
 40      'Microsoft Advertising',
 41      'Microsoft',
 42      'Microsoft Feedback',
 43      'Microsoft account team',
 44      'Microsoft Support',
 45      'Microsoft 365 Message center',
 46      'Microsoft Azure'
 47    )
 48    or regex.icontains(sender.display_name,
 49                       "[MḾṀṂⱮМḿṁṃᵯⱮ𝐌𝑀][iíìîïīĭĩįıɪɨᵢⁱ𝐢𝑖][cćĉċčçƈȼ𝐜𝑐][rŕŗřȑȓɾᵣⁿʳ𝐫𝑟][oóòôõöøōŏőɵₒᵒº𝐨𝑜][sśŝšșşʂᵴˢˢ𝐬𝑠][oóòôõöøōŏőɵₒᵒº𝐨𝑜][fḟƒᵮᶠ𝐟𝑓][tťțţᵵₜᵗᵗ𝐭𝑡]"
 50    )
 51    or regex.icontains(sender.display_name,
 52                       "[MḾṀṂⱮМḿṁṃᵯⱮ𝐌𝑀][iíìîïīĭĩįıɪɨᵢⁱ𝐢𝑖][rŕŗřȑȓɾᵣⁿʳ𝐫𝑟][cćĉċčçƈȼ𝐜𝑐][oóòôõöøōŏőɵₒᵒº𝐨𝑜][sśŝšșşʂᵴˢˢ𝐬𝑠][oóòôõöøōŏőɵₒᵒº𝐨𝑜][fḟƒᵮᶠ𝐟𝑓][tťțţᵵₜᵗᵗ𝐭𝑡]" // [sic]
 53    )
 54  )
 55  and sender.email.domain.root_domain not in~ (
 56    'microsoft.com',
 57    'microsoftstoreemail.com',
 58    'microsoftsupport.com',
 59    'office.com',
 60    'teams-events.com',
 61    'qualtrics-research.com',
 62    'skype.com',
 63    'azureadnotifications.us',
 64    'microsoftonline.us',
 65    'mail.microsoft',
 66    'office365.com'
 67  )
 68  and not (
 69    sender.email.domain.domain in~ (
 70      'microsoft.regsvc.com',
 71      'microsoft.onmicrosoft.com'
 72    )
 73    and headers.auth_summary.dmarc.pass
 74  )
 75  and (
 76    profile.by_sender().prevalence in ("new", "outlier")
 77    or (
 78      profile.by_sender().any_messages_malicious_or_spam
 79      and not profile.by_sender().any_messages_benign
 80    )
 81  )
 82  
 83  // negate legitimate Office 365 bouncebacks
 84  and not (
 85    all(attachments,
 86        .content_type in ("message/delivery-status", "message/rfc822")
 87    )
 88    and (
 89      sender.email.local_part in ('postmaster', 'mailer-daemon')
 90      or strings.starts_with(sender.email.local_part, 'microsoftexchange')
 91    )
 92    and (
 93      strings.contains(subject.subject, 'Undeliverable:')
 94      or strings.contains(subject.subject, 'Blocked:')
 95      or strings.contains(subject.subject, 'Não é possível entregar:')
 96    )
 97  )
 98  
 99  // negate other legitimate MS notifications
100  and not (
101    length(body.links) > 0
102    and all(body.links,
103            .href_url.domain.root_domain in (
104              "aka.ms",
105              "microsoftonline.com",
106              "microsoft.com"
107            )
108            or .href_url.domain.tld == "microsoft"
109    )
110    and headers.auth_summary.dmarc.pass
111  )
112  
113  // negate highly trusted sender domains unless they fail DMARC authentication
114  and (
115    (
116      sender.email.domain.root_domain in $high_trust_sender_root_domains
117      and not headers.auth_summary.dmarc.pass
118    )
119    or sender.email.domain.root_domain not in $high_trust_sender_root_domains
120  )
121  // not a newsletter or advertisement
122  and not any(beta.ml_topic(body.current_thread.text).topics,
123              .name in ("Newsletters and Digests")
124              and .confidence == "high"
125              and (
126                any(body.links,
127                    strings.icontains(.display_text, "unsubscribe")
128                    and (strings.icontains(.href_url.path, "unsubscribe"))
129                )
130              )
131  )  
132
133attack_types:
134  - "Credential Phishing"
135tactics_and_techniques:
136  - "Impersonation: Brand"
137  - "Social engineering"
138detection_methods:
139  - "Content analysis"
140  - "Sender analysis"
141id: "6e2f04e6-b607-5e36-9015-d39c98265579"
to-top