Skip to content

Commit

Permalink
New Rule: Sender name contains Active Directory distinguished name (#653
Browse files Browse the repository at this point in the history
)

Co-authored-by: ID Generator <[email protected]>
Co-authored-by: Sam Scholten <[email protected]>
  • Loading branch information
3 people authored Dec 18, 2023
1 parent bff7733 commit e75cdde
Showing 1 changed file with 15 additions and 0 deletions.
15 changes: 15 additions & 0 deletions detection-rules/sender_ad_distinguished_name.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
name: "Sender name contains Active Directory distinguished name"
description: |
Sender's display name contains an Active Directory distinguished name or a similar string. This has been observed as a malicious indicator in the wild.
type: "rule"
severity: "medium"
source: |
type.inbound
and regex.icontains(sender.display_name, '(EX|LABS|OU|CN|EXCHANGE)(=|/)')
tags:
- "Suspicious sender"
attack_types:
- "Credential Phishing"
detection_methods:
- "Sender analysis"
id: "4f3c4901-a4ad-509b-ab83-bf3f118a3940"

0 comments on commit e75cdde

Please sign in to comment.