Brand impersonation: Microsoft
Impersonation of the Microsoft brand.
Sublime rule (View on GitHub)
1name: "Brand impersonation: Microsoft"
2description: |
3 Impersonation of the Microsoft brand.
4references:
5 - "https://www.itproportal.com/news/cybercriminals-launch-targeted-phishing-attacks-against-microsoft-365-users/"
6 - "https://cofense.com/blog/office-365-phishing-variant/"
7 - "https://www.helpnetsecurity.com/2020/05/04/fake-microsoft-teams-notification/"
8type: "rule"
9severity: "high"
10authors:
11 - twitter: "amitchell516"
12source: |
13 type.inbound
14 and (
15 length(body.links) < 30
16 or sender.email.local_part == "newsletter" and length(body.links) < 5
17 )
18 and (
19 (
20 strings.ilike(subject.subject, '*Microsoft 365*')
21 and strings.ilike(subject.subject, '*is expired*')
22 )
23 or (
24 // should catch any instance of the word "expired"
25 strings.ilike(body.current_thread.text, "*expir*")
26 and strings.ilike(body.current_thread.text, "*password*")
27 and strings.ilike(body.current_thread.text, "*microsoft*")
28 )
29 or regex.icontains(body.current_thread.text,
30 ".*reach you.{0,20}Microsoft Teams"
31 )
32 or strings.ilike(sender.display_name, '*new activity in Teams*')
33 or subject.subject =~ 'Offline Message in Teams'
34 or strings.ilike(subject.subject, '*Teams Sent A Message')
35 or sender.display_name in~ (
36 'Microsoft Partner Network',
37 'Microsoft',
38 'Microsoft Feedback',
39 'Microsoft account team',
40 'Microsoft Support',
41 'Microsoft 365 Message center',
42 'Microsoft Azure'
43 )
44 )
45 and sender.email.domain.root_domain not in~ (
46 'microsoft.com',
47 'microsoftstoreemail.com',
48 'microsoftsupport.com',
49 'office.com',
50 'teams-events.com',
51 'qualtrics-research.com'
52 )
53 and (
54 profile.by_sender().prevalence in ("new", "outlier")
55 or (
56 profile.by_sender().any_messages_malicious_or_spam
57 and not profile.by_sender().any_false_positives
58 )
59 )
60
61 // negate legitimate Office 365 bouncebacks
62 and not (
63 all(attachments,
64 .content_type in ("message/delivery-status", "message/rfc822")
65 )
66 and (sender.email.local_part in ('postmaster', 'mailer-daemon'))
67 and strings.contains(subject.subject, 'Undeliverable:')
68 )
69
70 // negate highly trusted sender domains unless they fail DMARC authentication
71 and (
72 (
73 sender.email.domain.root_domain in $high_trust_sender_root_domains
74 and not headers.auth_summary.dmarc.pass
75 )
76 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
77 )
78
79attack_types:
80 - "Credential Phishing"
81tactics_and_techniques:
82 - "Impersonation: Brand"
83 - "Social engineering"
84detection_methods:
85 - "Content analysis"
86 - "Sender analysis"
87id: "6e2f04e6-b607-5e36-9015-d39c98265579"