Link: Microsoft impersonation using hosted png with suspicious link

Detects messages with a link to a Microsoft hosted logo where the sender's display name and the display text of a link in the body are in all caps, and a request is being made from a first-time sender.

Sublime rule (View on GitHub)

 1name: "Link: Microsoft impersonation using hosted png with suspicious link"
 2description: |
 3  Detects messages with a link to a Microsoft hosted logo where the sender's display name
 4  and the display text of a link in the body are in all caps, and a request is being made from a first-time sender.  
 5type: "rule"
 6severity: "medium"
 7source: |
 8  type.inbound
 9  
10  // display name is in all caps
11  and regex.match(sender.display_name, '[A-Z ]+')
12  
13  // the sender is not microsoft
14  and sender.email.domain.root_domain not in~ (
15    'microsoft.com',
16    'microsoftsupport.com',
17    'office.com'
18  )
19  
20  // logo hosted on microsoft.com
21  and any(body.links,
22          regex.icontains(.display_url.url,
23                          '.{0,50}microsoft\.com\/.{0,70}logo.{0,25}\.png'
24          )
25  )
26  
27  // and at least one link display text is in all caps
28  and any(body.links,
29          regex.icontains(.display_text, '[VIEW|CLICK|DOWNLOAD|CHECK]')
30  )
31  
32  // request being made
33  and any(ml.nlu_classifier(body.html.inner_text).entities, .name == "request")
34  
35  // sender domain matches no body domains
36  and not any(body.links,
37              .href_url.domain.root_domain == sender.email.domain.root_domain
38              and .href_url.domain.root_domain not in $tranco_1m
39  )
40  
41  // org domain in the subject of the message
42  and any($org_domains, strings.icontains(subject.subject, .))
43  and (
44    profile.by_sender().prevalence in ("new", "outlier")
45    or (
46      profile.by_sender().any_messages_malicious_or_spam
47      and not profile.by_sender().any_messages_benign
48    )
49  )  
50attack_types:
51  - "Credential Phishing"
52tactics_and_techniques:
53  - "Impersonation: Brand"
54  - "Social engineering"
55detection_methods:
56  - "Content analysis"
57  - "Natural Language Understanding"
58  - "Sender analysis"
59  - "URL analysis"
60id: "07c696d4-c58e-5252-96e2-70211f9de338"
to-top