Skip to content

Commit

Permalink
Sync from PR#845
Browse files Browse the repository at this point in the history
New Rule: open_redirect_indeed.yml by @aidenmitchell
#845
Source SHA 9ddb067
Triggered by @morriscode
  • Loading branch information
Sublime Rule Testing Bot committed May 10, 2024
1 parent ecded4c commit 9369cfc
Showing 1 changed file with 31 additions and 0 deletions.
31 changes: 31 additions & 0 deletions detection-rules/open_redirect_indeed.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
name: "Open redirect: Indeed"
description: "Detects emails containing links using Indeed '/r?target=xxxxxx' open redirect where the email has not come from indeed.com"
references:
- "https://www.bleepingcomputer.com/news/security/evilproxy-uses-indeedcom-open-redirect-for-microsoft-365-phishing/"
type: "rule"
severity: "medium"
source: |
type.inbound
and (
(
sender.email.domain.root_domain != "indeed.com"
and any(body.links, "indeed_open_redirect" in .href_url.rewrite.encoders)
)
or any(attachments,
.file_type == "pdf"
and any(file.explode(.),
any(.scan.url.urls, "indeed_open_redirect" in .rewrite.encoders)
)
)
)
attack_types:
- "Credential Phishing"
- "Malware/Ransomware"
tactics_and_techniques:
- "Open redirect"
detection_methods:
- "Sender analysis"
- "URL analysis"
id: "98ce5477-49dd-5e60-b778-f8c2fcb283c2"
testing_pr: 845
testing_sha: 9ddb067c7e8cbda7d81640ce70e0537f61b1714f

0 comments on commit 9369cfc

Please sign in to comment.