Suspicious recipients pattern with NLU credential theft indicators
Detects messages with undisclosed recipients (likely all bcc) and NLU identified a credential theft intent with medium to high confidence from a suspicious low reputation link domain
Sublime rule (View on GitHub)
1name: "Suspicious recipients pattern with NLU credential theft indicators"
2description: "Detects messages with undisclosed recipients (likely all bcc) and NLU identified a credential theft intent with medium to high confidence from a suspicious low reputation link domain"
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and (
8 length(recipients.to) == 0
9 or all(recipients.to, strings.ilike(.display_name, "undisclosed?recipients"))
10 )
11 and length(recipients.cc) == 0
12 and 0 <= length(recipients.bcc) <= 1
13 and any(body.links, .href_url.domain.root_domain not in $tranco_1m)
14 and (
15 any(body.links,
16 regex.icontains(.display_text,
17 '(view|click|download|goto)?(attachment|download|file|online|document)s?'
18 )
19 or all(body.links, regex.match(.display_text, "[A-Z ]+"))
20 )
21 )
22 and any(ml.nlu_classifier(body.current_thread.text).intents,
23 .name in ("cred_theft") and .confidence in ("medium", "high")
24 )
25attack_types:
26 - "Credential Phishing"
27tactics_and_techniques:
28 - "Evasion"
29detection_methods:
30 - "Content analysis"
31 - "Header analysis"
32 - "Natural Language Understanding"
33 - "URL analysis"
34id: "8e121c3e-b9cf-5aa3-b799-e025a69b7d8c"