Link: QuickBooks image lure with suspicious link
This rule detects messages with image attachments containing QuickBooks logo containing exactly 1 link to a suspicious URL.
Sublime rule (View on GitHub)
1name: "Link: QuickBooks image lure with suspicious link"
2description: "This rule detects messages with image attachments containing QuickBooks logo containing exactly 1 link to a suspicious URL. "
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and length(attachments) < 3
8 and any(attachments,
9 .file_type in $file_types_images
10 and any(ml.logo_detect(.).brands, .name == "Quickbooks")
11 )
12 and length(body.links) == 1
13 and (
14 // body text is very short
15 (
16 0 <= (length(body.current_thread.text)) < 10
17 or body.current_thread.text is null
18 )
19 or (
20 length(body.current_thread.text) < 1500
21 // or body is most likely all warning banner (text contains the sender and common warning banner language)
22 and (
23 regex.icontains(body.current_thread.text,
24 'caution|confidentiality notice|warning|disclaimer|permission'
25 )
26 )
27 )
28 )
29
30 // suspicious link
31 and any(body.links,
32 (
33 .href_url.domain.root_domain not in $tranco_1m
34 or .href_url.domain.domain in $free_file_hosts
35 or .href_url.domain.root_domain in $free_file_hosts
36 or .href_url.domain.root_domain in $free_subdomain_hosts
37 or .href_url.domain.domain in $url_shorteners
38 or
39
40 // mass mailer link, masks the actual URL
41 .href_url.domain.root_domain in (
42 "hubspotlinks.com",
43 "mandrillapp.com",
44 "sendgrid.net",
45 "naylorcampaigns.com",
46 "rs6.net"
47 )
48 )
49
50 // exclude sources of potential FPs
51 and (
52 .href_url.domain.root_domain not in (
53 "svc.ms",
54 "sharepoint.com",
55 "1drv.ms",
56 "microsoft.com",
57 "aka.ms",
58 "msftauthimages.net",
59 "intuit.com",
60 "turbotax.com",
61 "intuit.ca"
62 )
63 or any(body.links, .href_url.domain.domain in $free_file_hosts)
64 )
65 and .href_url.domain.root_domain not in $org_domains
66 )
67 and sender.email.domain.root_domain not in~ (
68 'intuit.com',
69 'turbotax.com',
70 'intuit.ca'
71 )
72
73 // negate highly trusted sender domains unless they fail DMARC authentication
74 and (
75 (
76 sender.email.domain.root_domain in $high_trust_sender_root_domains
77 and not headers.auth_summary.dmarc.pass
78 )
79 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
80 )
81
82attack_types:
83 - "Credential Phishing"
84tactics_and_techniques:
85 - "Impersonation: Brand"
86 - "Social engineering"
87detection_methods:
88 - "Computer Vision"
89 - "File analysis"
90 - "Optical Character Recognition"
91 - "URL analysis"
92id: "3826a923-865e-5d87-82e4-0c1f8434efc0"