Link: Cloud service with credential theft language

Detects messages impersonating cloud services that contain high-confidence credential theft language and file sharing topics. The message starts with 'Cloud' or a cloud emoji, contains links to external domains not matching the sender's domain, and lacks recipient identification entities.

Sublime rule (View on GitHub)

 1name: "Link: Cloud service with credential theft language"
 2description: "Detects messages impersonating cloud services that contain high-confidence credential theft language and file sharing topics. The message starts with 'Cloud' or a cloud emoji, contains links to external domains not matching the sender's domain, and lacks recipient identification entities."
 3type: "rule"
 4severity: "medium"
 5source: |
 6  type.inbound
 7  and (
 8    strings.starts_with(body.current_thread.text, 'Cloud')
 9    // cloud emoji
10    or regex.contains(body.current_thread.text, '^\x{2601}')
11  )
12  and any(ml.nlu_classifier(body.current_thread.text).intents,
13          .name == 'cred_theft' and .confidence == 'high'
14  )
15  and any(ml.nlu_classifier(body.current_thread.text).topics,
16          .name == 'File Sharing and Cloud Services' and .confidence == 'high'
17  )
18  // sender domain matches no body domains
19  and length(body.links) > 0
20  and all(body.links,
21          .href_url.domain.root_domain != sender.email.domain.root_domain
22  )
23  // negate legit cloud companies
24  and not (
25    sender.email.domain.root_domain in ("cloud-cme.com", "cloudcounting.online")
26    // check for SPF or DMARC passed
27    and (headers.auth_summary.spf.pass or headers.auth_summary.dmarc.pass)
28  )
29  // negate highly trusted sender domains unless they fail DMARC authentication
30  and not (
31    sender.email.domain.root_domain in $high_trust_sender_root_domains
32    and coalesce(headers.auth_summary.dmarc.pass, false)
33  )  
34attack_types:
35  - "Credential Phishing"
36tactics_and_techniques:
37  - "Social engineering"
38detection_methods:
39  - "Content analysis"
40  - "Natural Language Understanding"
41  - "Sender analysis"
42  - "URL analysis"
43id: "5f1395a6-e2ae-5175-ad29-5f35111219fd"
to-top