Skip to content

Update impersonation_adobe_suspicious_language_link.yml #2690

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

aidenmitchell
Copy link
Member

Description

This pull request updates the detection logic in the impersonation_adobe_suspicious_language_link.yml rule to enhance its accuracy and reduce false positives. The changes focus on refining conditions for detecting Adobe-related impersonation attempts by incorporating additional checks and improving sender profile evaluation.

Enhancements to detection logic:

  • Added a new condition to check if the email body contains the term "adobe" and matches a specific machine-learned topic ("File Sharing and Cloud Services"). This complements the existing logo detection logic for identifying Adobe-related content.

Improvements to sender profile evaluation:

  • Updated the logic to include a condition that flags emails if the sender's email has not been in contact for more than 14 days (profile.by_sender_email().days_since.last_contact > 14).
  • Added a condition to exclude senders with any benign message history (not profile.by_sender().any_messages_benign) to reduce false positives.

Associated samples

@aidenmitchell aidenmitchell requested a review from a team as a code owner May 9, 2025 15:50
@aidenmitchell aidenmitchell added the in-test-rules PR is in our testing suite to collect telemetry label May 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
in-test-rules PR is in our testing suite to collect telemetry
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant