Skip to content

Commit a11f9ae

Browse files
[PR #3428] added rule: Attachment: Credit card application with WhatsApp contact
1 parent 8f4b524 commit a11f9ae

File tree

1 file changed

+61
-0
lines changed

1 file changed

+61
-0
lines changed
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
name: "Attachment: Credit card application with WhatsApp contact"
2+
description: "Detects messages containing promotional credit card offers with attached forms requesting extensive personal information (PII) and directing victims to contact via WhatsApp, indicating potential fraud."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
// promotional/advertising content targeting financial services
8+
and (
9+
regex.icontains(body.current_thread.text,
10+
"credit card.*offer|promotional.*credit|free.*credit card|lifetime.*free|special offer"
11+
)
12+
or regex.icontains(subject.subject,
13+
"credit card.*offer|promotional.*credit|free.*credit card|lifetime.*free"
14+
)
15+
or any(ml.nlu_classifier(body.current_thread.text).topics,
16+
.name in ("Advertising and Promotions")
17+
)
18+
)
19+
// PII harvesting template in attachments (3+ of these patterns)
20+
and any(attachments,
21+
any(file.explode(.),
22+
3 of (
23+
regex.icontains(.scan.strings.raw, "Credit Card Application"),
24+
regex.icontains(.scan.strings.raw, "Date of Birth"),
25+
regex.icontains(.scan.strings.raw, "[eE]mail"),
26+
regex.icontains(.scan.strings.raw, "[aA]ddress"),
27+
regex.icontains(.scan.strings.raw, "Contact No"),
28+
regex.icontains(.scan.strings.raw, "Pan No"),
29+
regex.icontains(.scan.strings.raw, "ADHAAR"),
30+
regex.icontains(.scan.strings.raw, "Annual.*salary"),
31+
regex.icontains(.scan.strings.raw, "Mother Name"),
32+
regex.icontains(.scan.strings.raw, "Father Name"),
33+
regex.icontains(.scan.strings.raw, "SINGLE.*MARRIED")
34+
)
35+
)
36+
)
37+
// WhatsApp contact method (suspicious for legitimate financial institutions)
38+
and (
39+
regex.icontains(body.current_thread.text, "whatsapp")
40+
or any(attachments,
41+
any(file.explode(.), regex.icontains(.scan.qr.url.url, "wa\\.me"))
42+
)
43+
or any(file.explode(file.message_screenshot()),
44+
regex.icontains(.scan.qr.url.url, "wa\\.me")
45+
)
46+
)
47+
48+
attack_types:
49+
- "BEC/Fraud"
50+
tactics_and_techniques:
51+
- "Social engineering"
52+
- "Out of band pivot"
53+
detection_methods:
54+
- "Content analysis"
55+
- "File analysis"
56+
- "Natural Language Understanding"
57+
- "QR code analysis"
58+
id: "aaeb35de-1b50-5222-ae9d-6b2fd167bb8a"
59+
og_id: "95b08315-93a6-5005-8f38-ff597eb9f947"
60+
testing_pr: 3428
61+
testing_sha: 75d66d2a1b9c365689b718a9e47a80d99a87e3ce

0 commit comments

Comments
 (0)