Link: QR code in EML attachment with credential phishing indicators
This rule detects QR codes in EML attachments that return a phishing disposition when analyzed, or are leveraging a known open redirect.
Sublime rule (View on GitHub)
1name: "Link: QR code in EML attachment with credential phishing indicators"
2description: "This rule detects QR codes in EML attachments that return a phishing disposition when analyzed, or are leveraging a known open redirect. "
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and length(attachments) == 1
8 and any(attachments,
9 (.content_type == "message/rfc822" or .file_extension =~ "eml")
10 // credential theft language in the attached EML
11 and any(file.explode(.),
12 .depth > 0
13 and .scan.qr.type == "url"
14
15 // linkanalysis phishing disposition
16 and any([ml.link_analysis(.scan.qr.url)],
17 .credphish.disposition == "phishing"
18 or any(..scan.qr.url.rewrite.encoders,
19 strings.icontains(., "open_redirect")
20 )
21 )
22 and .scan.qr.url.domain.root_domain not in $org_domains
23 )
24 )
25
26attack_types:
27 - "Credential Phishing"
28tactics_and_techniques:
29 - "Evasion"
30 - "Open redirect"
31 - "QR code"
32detection_methods:
33 - "Computer Vision"
34 - "Content analysis"
35 - "File analysis"
36 - "QR code analysis"
37
38id: "9908ed3a-4c01-5a8d-82f9-78794b367c6e"