Skip to content

Commit 36399ee

Browse files
author
Sublime Rule Testing Bot
committed
Sync from PR#2645
Create brand_impersonation_procore.yml by @morriscode #2645 Source SHA f7ce66a Triggered by @morriscode
1 parent b42ee8d commit 36399ee

File tree

1 file changed

+40
-3
lines changed

1 file changed

+40
-3
lines changed

detection-rules/2645_brand_impersonation_procore.yml

Lines changed: 40 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,45 @@
11
name: "Brand Impersonation: Procore"
2-
description: "Detects messages containing Procore branding language that do not originate from legitimate Procore domains. This has been observed in phishing campaigns. "
2+
description: "Detects messages containing Procore branding language that do not originate from legitimate Procore domains. This has been observed in phishing campaigns."
33
type: "rule"
44
severity: "medium"
5-
source: "type.inbound\nand strings.ilike(body.current_thread.text, \"*powered by procore*\") \nand not sender.email.domain.root_domain == \"procore.com\"\n"
5+
source: |
6+
type.inbound
7+
and strings.ilike(body.current_thread.text, "*powered by procore*")
8+
and not sender.email.domain.root_domain in ("procore.com", "procoretech.com")
9+
and not any(body.links, .href_url.domain.domain == "storage.procore.com")
10+
11+
// negating legit replies/forwards
12+
// https://github.com/sublime-security/sublime-rules/blob/main/insights/authentication/org_inbound_auth_pass.yml
13+
and not (
14+
(
15+
strings.istarts_with(subject.subject, "RE:")
16+
or strings.istarts_with(subject.subject, "FW:")
17+
or strings.istarts_with(subject.subject, "FWD:")
18+
or regex.imatch(subject.subject,
19+
'(\[[^\]]+\]\s?){0,3}(re|fwd?|automat.*)\s?:.*'
20+
)
21+
or strings.istarts_with(subject.subject, "Réponse automatique")
22+
)
23+
and (
24+
length(headers.references) > 0
25+
and any(headers.hops, any(.fields, strings.ilike(.name, "In-Reply-To")))
26+
)
27+
)
28+
// negate bounce backs
29+
and not (
30+
strings.like(sender.email.local_part,
31+
"*postmaster*",
32+
"*mailer-daemon*",
33+
"*administrator*"
34+
)
35+
and any(attachments,
36+
.content_type in (
37+
"message/rfc822",
38+
"message/delivery-status",
39+
"text/calendar"
40+
)
41+
)
42+
)
643
attack_types:
744
- "BEC/Fraud"
845
- "Credential Phishing"
@@ -15,4 +52,4 @@ detection_methods:
1552
id: "bffb6dc3-00d8-5d04-421c-68ea84b5c425"
1653
og_id: "74baa1e5-f1cd-5d15-b2f2-e863baf4a20f"
1754
testing_pr: 2645
18-
testing_sha: 23f711c3392ae33cac1c35b4bce395e7a09fa095
55+
testing_sha: f7ce66a32766f8b5965f976bdd901f2352eb227f

0 commit comments

Comments
 (0)