Link: Microsoft Dynamics 365 form phishing
Email body is suspicious, and links to a Microsoft Dynamics form. Known phishing tactic.
Sublime rule (View on GitHub)
1name: "Link: Microsoft Dynamics 365 form phishing"
2description: |
3 Email body is suspicious, and links to a Microsoft Dynamics form. Known phishing tactic.
4references:
5 - "https://cofense.com/blog/compromised-microsoft-dynamic-365-customer-voice-account-used-for-phishing-attack/"
6type: "rule"
7severity: "high"
8source: |
9 type.inbound
10 and any(body.links,
11 .href_url.domain.domain in (
12 "ncv.microsoft.com",
13 "customervoice.microsoft.com"
14 )
15 and ml.link_analysis(.).effective_url.domain.domain == "customervoice.microsoft.com"
16
17 // confirm it is a form
18 and (
19 any(ml.link_analysis(.).final_dom.links,
20 .href_url.domain.domain == "cdn.forms.office.net"
21 )
22 or strings.icontains(ml.link_analysis(.).final_dom.raw,
23 "cdn.forms.office.net"
24 )
25 or .href_url.path == "/Pages/ResponsePage.aspx"
26 )
27
28 // analyze for credential phishing signals
29 and (
30 //
31 // This rule makes use of a beta feature and is subject to change without notice
32 // using the beta feature in custom rules is not suggested until it has been formally released
33 //
34 any(ml.nlu_classifier(beta.ocr(ml.link_analysis(.).screenshot).text).intents,
35 .name == "cred_theft" and .confidence != "low"
36 )
37 or any(ml.nlu_classifier(body.current_thread.text).intents,
38 .name == "cred_theft" and .confidence != "low"
39 )
40 )
41 )
42 and (
43 not profile.by_sender().solicited
44 or (
45 profile.by_sender().any_messages_malicious_or_spam
46 and not profile.by_sender().any_messages_benign
47 )
48 )
49 and not profile.by_sender().any_messages_benign
50
51 // negate highly trusted sender domains unless they fail DMARC authentication
52 and (
53 (
54 sender.email.domain.root_domain in $high_trust_sender_root_domains
55 and not headers.auth_summary.dmarc.pass
56 )
57 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
58 )
59attack_types:
60 - "Credential Phishing"
61tactics_and_techniques:
62 - "Evasion"
63detection_methods:
64 - "Content analysis"
65 - "File analysis"
66 - "Optical Character Recognition"
67 - "Natural Language Understanding"
68 - "URL analysis"
69 - "URL screenshot"
70id: "f72b9085-8c48-5c8c-9b0d-0ce6ef3494dc"