Service abuse: SendThisFile with credential theft and financial language
Detects messages from sendthisfile.com containing credential theft language combined with financial communications topics.
Sublime rule (View on GitHub)
1name: "Service abuse: SendThisFile with credential theft and financial language"
2description: "Detects messages from sendthisfile.com containing credential theft language combined with financial communications topics."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and sender.email.domain.root_domain == "sendthisfile.com"
8 and any(ml.nlu_classifier(body.current_thread.text).intents,
9 .name == "cred_theft" and .confidence != "low"
10 )
11 and any(ml.nlu_classifier(body.current_thread.text).topics,
12 .name == "Financial Communications" and .confidence != "low"
13 )
14 // not a reply or forward
15 and (headers.in_reply_to is null or length(headers.references) == 0)
16
17attack_types:
18 - "BEC/Fraud"
19 - "Credential Phishing"
20tactics_and_techniques:
21 - "Free file host"
22 - "Social engineering"
23detection_methods:
24 - "Content analysis"
25 - "Natural Language Understanding"
26 - "Sender analysis"
27id: "c1ebf25b-0707-504f-b041-e7c27dfa9f05"