Skip to content

Commit

Permalink
Sync from PR#806
Browse files Browse the repository at this point in the history
New Rule: HTML smuggling with decimal encoding by @morriscode
#806
Source SHA f837050
Triggered by @morriscode
  • Loading branch information
Sublime Rule Testing Bot committed Sep 20, 2023
1 parent 3885a34 commit e57e371
Showing 1 changed file with 40 additions and 0 deletions.
40 changes: 40 additions & 0 deletions detection-rules/attachment_html_smuggling_decimal_encoding.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
name: "Attachment: HTML smuggling with decimal encoding"
description: "Potential HTML smuggling attack based on large blocks of decimal encoding. Attackers often use decimal encoding as an obfuscation technique to bypass traditional email security measures. \n"
type: "rule"
severity: "high"
source: |
type.inbound
and any(attachments,
(
.file_extension in~ ("html", "htm", "shtml", "dhtml", "xhtml")
or (
.file_extension is null
and .file_type == "unknown"
and .content_type == "application/octet-stream"
)
or .file_extension in~ $file_extensions_common_archives
or .file_type == "html"
or .content_type == "text/html"
)
and any(file.explode(.),
// suspicious identifiers
any(.scan.strings.strings,
regex.contains(., '(\d{2,3},){60,}')
)
)
)
attack_types:
- "Credential Phishing"
- "Malware/Ransomware"
tactics_and_techniques:
- "Evasion"
- "HTML smuggling"
- "Scripting"
detection_methods:
- "Archive analysis"
- "Content analysis"
- "File analysis"
- "HTML analysis"
id: "f99213c4-7031-50b1-ae81-b45f790d3fa4"
testing_pr: 806
testing_sha: f8370503687493c7d7863f377fb9087c31e1b844

0 comments on commit e57e371

Please sign in to comment.