Credential phishing: Engaging language with IPFS link

Body contains credential theft indicators, and contains a link to an IPFS site. IPFS has been recently observed hosting phishing sites.

Sublime rule (View on GitHub)

 1name: "Credential phishing: Engaging language with IPFS link"
 2description: |
 3    Body contains credential theft indicators, and contains a link to an IPFS site. IPFS has been recently observed hosting phishing sites.
 4type: "rule"
 5severity: "high"
 6source: |
 7  type.inbound
 8  and strings.ilike(body.html.display_text, "*expir*")
 9  and strings.ilike(body.html.display_text, "*password*")
10  and any(ml.nlu_classifier(body.html.display_text).intents, .name == "cred_theft")
11  and any(body.links,
12          strings.icontains(beta.linkanalysis(.).effective_url.url, 'ipfs')
13          or (
14            regex.icontains(beta.linkanalysis(.).effective_url.path, '[\.-/]ipfs|ipfs[\.-/]')
15            and beta.linkanalysis(.).effective_url.domain.domain not in $org_domains
16            and (
17              (
18                // don't include high rep domains
19                beta.linkanalysis(.).effective_url.domain.domain not in $tranco_1m
20                and beta.linkanalysis(.).effective_url.domain.domain not in $umbrella_1m
21              )
22              // if it's in Tranco or Umbrella, still include it if it's one of these
23              or beta.linkanalysis(.).effective_url.domain.domain in $free_file_hosts
24              or beta.linkanalysis(.).effective_url.domain.root_domain in $free_subdomain_hosts
25            )
26          )
27  )  
28attack_types:
29  - "Credential Phishing"
30tactics_and_techniques:
31  - "Free file host"
32  - "Free subdomain host"
33  - "IPFS"
34detection_methods:
35  - "Content analysis"
36  - "Natural Language Understanding"
37  - "URL analysis"
38id: "996c4d83-0a13-53e4-928c-6c08caeedab7"
to-top