Service abuse: Microsoft Power Automate callback scam impersonation
Detects callback scam attempts using the legitimate Microsoft Power Automate service email address with high-confidence callback scam language in the message body.
Sublime rule (View on GitHub)
1name: "Service abuse: Microsoft Power Automate callback scam impersonation"
2description: "Detects callback scam attempts using the legitimate Microsoft Power Automate service email address with high-confidence callback scam language in the message body."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and sender.email.email == 'flow-noreply@microsoft.com'
8 and any(ml.nlu_classifier(body.current_thread.text).intents,
9 .name == "callback_scam" and .confidence != "low"
10 )
11
12attack_types:
13 - "Callback Phishing"
14tactics_and_techniques:
15 - "Out of band pivot"
16 - "Social engineering"
17detection_methods:
18 - "Content analysis"
19 - "Natural Language Understanding"
20 - "Sender analysis"
21id: "18d1c18b-ce21-5c53-b993-195ce8fdbe11"