Link: WordPress admin targeting with recipient identifier in URL fragment
Detects messages containing links to WordPress administrative paths (wp-admin, wp-content, wp-includes, etc.) where the URL fragment contains base64-encoded data that includes the recipient's email address, indicating potential targeted compromise attempts.
Sublime rule (View on GitHub)
1name: "Link: WordPress admin targeting with recipient identifier in URL fragment"
2description: "Detects messages containing links to WordPress administrative paths (wp-admin, wp-content, wp-includes, etc.) where the URL fragment contains base64-encoded data that includes the recipient's email address, indicating potential targeted compromise attempts."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and any(body.links,
8 regex.icontains(.href_url.path,
9 '^\/(?:wp-(?:admin|includes|content|login|json|signup|activate|cron|mail)|xmlrpc\.php)'
10 )
11 // base64 encoded
12 and (
13 any(strings.scan_base64(.href_url.fragment),
14 strings.icontains(., recipients.to[0].email.email)
15 )
16 // not base64
17 or strings.icontains(.href_url.fragment, recipients.to[0].email.email)
18 )
19 )
20attack_types:
21 - "Credential Phishing"
22tactics_and_techniques:
23 - "Evasion"
24 - "Social engineering"
25detection_methods:
26 - "URL analysis"
27 - "Content analysis"
28id: "d1b86351-5bbd-5c76-9dd4-c4f49602664a"