Skip to content

Commit 5ed4f8a

Browse files
[PR #3476] added rule: Attachment: PDF with Microsoft Purview message impersonation
1 parent 1fa0386 commit 5ed4f8a

File tree

1 file changed

+34
-0
lines changed

1 file changed

+34
-0
lines changed
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
name: "Attachment: PDF with Microsoft Purview message impersonation"
2+
description: "Detects PDF attachments containing text that impersonates Microsoft Purview secure message notifications, potentially used to trick users into believing they have received legitimate secure communications from Microsoft services."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and any(filter(attachments, .file_extension == 'pdf'),
8+
any(ml.nlu_classifier(beta.ocr(.).text).topics,
9+
.name == 'Secure Message' and .confidence == 'high'
10+
)
11+
and strings.icontains(beta.ocr(.).text, "Microsoft Purview Message")
12+
)
13+
// negate highly trusted sender domains unless they fail DMARC authentication
14+
and (
15+
(
16+
sender.email.domain.root_domain in $high_trust_sender_root_domains
17+
and not headers.auth_summary.dmarc.pass
18+
)
19+
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
20+
)
21+
attack_types:
22+
- "Credential Phishing"
23+
tactics_and_techniques:
24+
- "Impersonation: Brand"
25+
- "PDF"
26+
- "Social engineering"
27+
detection_methods:
28+
- "File analysis"
29+
- "Natural Language Understanding"
30+
- "Content analysis"
31+
id: "eaeb0d92-fbdf-5fff-be94-05f42fa6d75b"
32+
og_id: "571d4964-dc44-56eb-bff4-11068b1cd119"
33+
testing_pr: 3476
34+
testing_sha: 0bcf1d08b35ffdb4b8da84c9ad217510604dbb2a

0 commit comments

Comments
 (0)