Link: Figma design deck with credential theft language
A single link to a Figma design deck that contains credential theft language. The message comes from either a new sender, one with previously detected malicious activity, or a known sender who has not been in contact for over 30 days and has no history of benign messages.
Sublime rule (View on GitHub)
1name: "Link: Figma design deck with credential theft language"
2description: "A single link to a Figma design deck that contains credential theft language. The message comes from either a new sender, one with previously detected malicious activity, or a known sender who has not been in contact for over 30 days and has no history of benign messages."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 // only one link to Figma
8 and length(distinct(filter(body.links,
9 .href_url.domain.root_domain in ("figma.com")
10 and (
11 strings.istarts_with(.href_url.path, "/deck")
12 or (
13 strings.istarts_with(.href_url.path, "/design")
14 and .href_url.query_params is not null
15 )
16 )
17 ),
18 .href_url.url
19 )
20 ) == 1
21 and any(filter(body.links,
22 .href_url.domain.root_domain in ("figma.com")
23 and (
24 strings.istarts_with(.href_url.path, "/deck")
25 or (
26 strings.istarts_with(.href_url.path, "/design")
27 and .href_url.query_params is not null
28 )
29 )
30 ),
31 any(ml.nlu_classifier(beta.ocr(ml.link_analysis(.).screenshot).text).intents,
32 .name == "cred_theft" and .confidence in ("medium", "high")
33 )
34 or any(ml.nlu_classifier(beta.ocr(ml.link_analysis(.).screenshot).text).topics,
35 .name in ("E-Signature", "Secure Message")
36 and .confidence != "low"
37 )
38 )
39 and (
40 (
41 profile.by_sender().prevalence in ("new", "outlier")
42 and not profile.by_sender().solicited
43 )
44 or profile.by_sender().any_messages_malicious_or_spam
45 or profile.by_sender().days_since.last_contact > 30
46 // individual sender profile
47 or profile.by_sender_email().days_since.first_contact < 3
48 )
49 and not profile.by_sender().any_messages_benign
50attack_types:
51 - "Credential Phishing"
52tactics_and_techniques:
53 - "Evasion"
54 - "Free file host"
55 - "Social engineering"
56detection_methods:
57 - "Natural Language Understanding"
58 - "Computer Vision"
59 - "Optical Character Recognition"
60 - "URL analysis"
61 - "URL screenshot"
62 - "Sender analysis"
63id: "87601924-bdeb-5c35-8186-9d2a384fb5ae"