Skip to content

Commit 0c71a2e

Browse files
[PR #3476] added rule: Attachment: PDF With Microsoft Purview Message Impersonation
1 parent 9399af4 commit 0c71a2e

File tree

1 file changed

+27
-0
lines changed

1 file changed

+27
-0
lines changed
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
name: "Attachment: PDF With Microsoft Purview Message Impersonation"
2+
description: "Detects PDF attachments containing text that impersonates Microsoft Purview secure message notifications, potentially used to trick users into believing they have received legitimate secure communications from Microsoft services."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and any(filter(attachments, .file_extension == 'pdf'),
8+
any(ml.nlu_classifier(beta.ocr(.).text).topics,
9+
.name == 'Secure Message' and .confidence == 'high'
10+
)
11+
and strings.icontains(beta.ocr(.).text, "Microsoft Purview Message")
12+
)
13+
14+
attack_types:
15+
- "Credential Phishing"
16+
tactics_and_techniques:
17+
- "Impersonation: Brand"
18+
- "PDF"
19+
- "Social engineering"
20+
detection_methods:
21+
- "File analysis"
22+
- "Natural Language Understanding"
23+
- "Content analysis"
24+
id: "eaeb0d92-fbdf-5fff-be94-05f42fa6d75b"
25+
og_id: "571d4964-dc44-56eb-bff4-11068b1cd119"
26+
testing_pr: 3476
27+
testing_sha: 4821c33fc942de17f47854cbd883d98002d1401b

0 commit comments

Comments
 (0)