Skip to content

Commit 16040c9

Browse files
[PR #3431] modified rule: Credential phishing: Suspicious e-sign agreement document notification
1 parent a2a67d6 commit 16040c9

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

detection-rules/3431_credential_phishing_esign_document_notification.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,11 @@ source: |
135135
136136
// HR impersonation
137137
or strings.ilike(sender.display_name, "HR", "H?R", "*Human Resources*")
138+
139+
// Sender display name is a phone number
140+
or regex.imatch(sender.display_name,
141+
'\+?([ilo0-9]{1}.)?\(?[ilo0-9]{3}?\)?.[ilo0-9]{3}.?[ilo0-9]{4}'
142+
)
138143
)
139144
and (
140145
any(body.links,
@@ -157,7 +162,8 @@ source: |
157162
'enter.{0,15}teams',
158163
'Review and sign',
159164
'REVIEW.*DOCUMENT',
160-
'Open Document'
165+
'Open Document',
166+
'Sign Now'
161167
)
162168
// check that the display_text is all lowercase
163169
or (
@@ -278,4 +284,4 @@ detection_methods:
278284
id: "5ab6d351-9439-5acb-abf1-1c552bcf17a6"
279285
og_id: "9b68c2d8-951e-5e04-9fa3-2ca67d9226a6"
280286
testing_pr: 3431
281-
testing_sha: e17bb655884f2f6c2d3df3860ba734190a58d7f0
287+
testing_sha: bc1b20aaaacf4a3595a3f59a92cc2cbd41505775

0 commit comments

Comments
 (0)