Link: Credential Phishing traversing Russian infrastructure
This rule detects credential phishing attempts in emails traversing Russian TLDs by aggressively analyzing links for signs of phishing, including suspicious keywords, login prompts, or links flagged for credential theft, excluding emails from trusted domains unless they fail DMARC verification.
Sublime rule (View on GitHub)
1name: "Link: Credential Phishing traversing Russian infrastructure"
2description: "This rule detects credential phishing attempts in emails traversing Russian TLDs by aggressively analyzing links for signs of phishing, including suspicious keywords, login prompts, or links flagged for credential theft, excluding emails from trusted domains unless they fail DMARC verification."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and any(headers.domains, .tld in ("ru", "su"))
8 and any(ml.nlu_classifier(body.current_thread.text).intents,
9 .name == "cred_theft" and .confidence in ("medium", "high")
10 )
11 and 0 < length(body.links) < 5
12 and any(body.links,
13 beta.linkanalysis(., mode="aggressive").credphish.disposition == "phishing"
14 or (
15 strings.icontains(beta.linkanalysis(., mode="aggressive").final_dom.raw,
16 "Pàsswórd"
17 )
18 and (
19 beta.linkanalysis(., mode="aggressive").credphish.contains_login
20 or beta.linkanalysis(.).credphish.contains_captcha
21 )
22 )
23 or beta.linkanalysis(., mode="aggressive").effective_url.domain.tld in $suspicious_tlds
24 )
25 and (
26 not profile.by_sender().solicited
27 or profile.by_sender().any_messages_malicious_or_spam
28 )
29
30 // negate highly trusted sender domains unless they fail DMARC authentication
31 and (
32 (
33 sender.email.domain.root_domain in $high_trust_sender_root_domains
34 and (
35 any(distinct(headers.hops, .authentication_results.dmarc is not null),
36 strings.ilike(.authentication_results.dmarc, "*fail")
37 )
38 )
39 )
40 or sender.email.domain.root_domain not in $high_trust_sender_root_domains
41 )
42
43attack_types:
44 - "Credential Phishing"
45tactics_and_techniques:
46 - "Social engineering"
47detection_methods:
48 - "Content analysis"
49 - "Header analysis"
50 - "Natural Language Understanding"
51 - "URL analysis"
52
53id: "a5203e3b-979f-5feb-bc6c-d62de08a2823"