Link: Credential Phishing via WordPress

Detects when non-WordPress senders link to suspended or malicious WordPress blog sites, commonly used to redirect users to credential harvesting pages.

Sublime rule (View on GitHub)

 1name: "Link: Credential Phishing via WordPress"
 2description: "Detects when non-WordPress senders link to suspended or malicious WordPress blog sites, commonly used to redirect users to credential harvesting pages."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  and sender.email.domain.root_domain != "wordpress.com"
 8  // there are few links
 9  and 0 < length(body.links) <= 5
10  // there are wordpress links
11  and any(body.links,
12          .href_url.domain.root_domain == "wordpress.com"
13          and .href_url.domain.domain != "wordpress.com"
14  )
15  // a single link to wordpress site
16  and length(filter(body.links,
17                    .href_url.domain.root_domain == "wordpress.com"
18                    and .href_url.domain.domain != "wordpress.com"
19             )
20  ) == 1
21  
22  // not a reply
23  and length(headers.references) == 0
24  and headers.in_reply_to is null
25  
26  // we detect the wordpress page has phishing
27  and any(filter(body.links, .href_url.domain.root_domain == "wordpress.com"),
28          ml.link_analysis(.).credphish.disposition == "phishing"
29          or strings.icontains(ml.link_analysis(.).final_dom.display_text,
30                               'This blog has been archived or suspended in accordance with our Terms of Service'
31          )
32  )  
33
34attack_types:
35  - "Credential Phishing"
36tactics_and_techniques:
37  - "Social engineering"
38  - "Free subdomain host"
39detection_methods:
40  - "URL analysis"
41  - "Header analysis"
42  - "Computer Vision"
43id: "db696058-909c-585b-928e-7e64c9659015"
to-top