Microsoft Infrastructure Abuse With Suspicious Patterns
Attackers have been observed abusing Microsoft's services, with suspicious indicators such as default Microsoft 365 domains (onmicrosoft.com), non-Microsoft return paths, or Resent-From headers.
Sublime rule (View on GitHub)
1name: "Microsoft Infrastructure Abuse With Suspicious Patterns"
2description: "Attackers have been observed abusing Microsoft's services, with suspicious indicators such as default Microsoft 365 domains (onmicrosoft.com), non-Microsoft return paths, or Resent-From headers. "
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and sender.email.domain.root_domain == "microsoft.com"
8 and 1 of (
9 (
10 length(recipients.to) == 1
11 and all(recipients.to,
12 .email.domain.root_domain == "onmicrosoft.com"
13 and not .email.domain.domain in $org_domains
14 )
15 ),
16 headers.return_path.domain.root_domain not in~ (
17 'microsoft.com',
18 'microsoftstoreemail.com',
19 'microsoftsupport.com',
20 'office.com',
21 'teams-events.com',
22 'qualtrics-research.com',
23 'pb-dynmktg.com'
24 ),
25 any(headers.hops, any(.fields, .name == "Resent-From"))
26 )
27 and regex.icontains(body.current_thread.text, '\b\+?(\d{1}.)?\(?\d{3}?\)?\s~?\s?\d{3}.?~?.\d{4}\b')
28
29attack_types:
30 - "BEC/Fraud"
31 - "Callback Phishing"
32tactics_and_techniques:
33 - "Evasion"
34 - "Impersonation: Brand"
35 - "Social engineering"
36detection_methods:
37 - "Header analysis"
38 - "Sender analysis"
39id: "cfe8e804-39ec-546f-9144-f721b95d9df1"