From 64d6bf9ce26c4bc5363db3947ac32ca278c01818 Mon Sep 17 00:00:00 2001 From: Brandon Murphy <4827852+zoomequipd@users.noreply.github.com> Date: Mon, 25 Nov 2024 14:20:28 -0600 Subject: [PATCH] Create brand_impersonation_knowbe4.yml (#2079) Co-authored-by: ID Generator --- .../brand_impersonation_knowbe4.yml | 40 +++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 detection-rules/brand_impersonation_knowbe4.yml diff --git a/detection-rules/brand_impersonation_knowbe4.yml b/detection-rules/brand_impersonation_knowbe4.yml new file mode 100644 index 00000000000..213d71348e3 --- /dev/null +++ b/detection-rules/brand_impersonation_knowbe4.yml @@ -0,0 +1,40 @@ +name: "Brand impersonation: KnowBe4" +description: "Impersonation of KnowBe4." +type: "rule" +severity: "medium" +source: | + type.inbound + and ( + sender.display_name =~ 'KnowBe4' + or strings.ilevenshtein(sender.display_name, 'KnowBe4') <= 1 + or strings.icontains(sender.email.domain.domain, '*KnowBe4*') + ) + and ( + sender.email.domain.root_domain not in ('knowbe4.com') + or ( + sender.email.domain.root_domain in ('knowbe4.com') + and not headers.auth_summary.dmarc.pass + ) + ) + + // negate highly trusted sender domains unless they fail DMARC authentication + and ( + ( + sender.email.domain.root_domain in $high_trust_sender_root_domains + and not headers.auth_summary.dmarc.pass + ) + or sender.email.domain.root_domain not in $high_trust_sender_root_domains + ) +attack_types: + - "Credential Phishing" + - "Spam" +tactics_and_techniques: + - "Free email provider" + - "Impersonation: Brand" + - "Lookalike domain" + - "Social engineering" +detection_methods: + - "Computer Vision" + - "Header analysis" + - "Sender analysis" +id: "7c798386-fd25-5890-83b3-85187adbfc44"