Link: Breely link masquerading as PDF
Detects messages containing a single Breely link that displays as a PDF file. Typically, redirects to a different destination for malicious purposes.
Sublime rule (View on GitHub)
1name: "Link: Breely link masquerading as PDF"
2description: "Detects messages containing a single Breely link that displays as a PDF file. Typically, redirects to a different destination for malicious purposes."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and length(filter(body.links, .href_url.domain.root_domain == "breely.com")) == 1
8 and any(body.links,
9 .href_url.domain.root_domain == "breely.com"
10 and strings.icontains(.display_text, ".pdf")
11 )
12
13attack_types:
14 - "BEC/Fraud"
15 - "Credential Phishing"
16tactics_and_techniques:
17 - "Free subdomain host"
18 - "Social engineering"
19detection_methods:
20 - "Content analysis"
21 - "URL analysis"
22id: "4a498c21-2f8a-5b54-84f5-c3c4ad3ee8e9"