heroui logo

Open Redirect: vconfex.com

Sublime Rules

View Source
Summary
This detection rule identifies potential open redirect attacks that utilize the vconfex.com domain, which has been abused in phishing scenarios. The rule inspects inbound messages for links that point to vconfex.com, specifically checking that the link's path starts with '/etl.php' and contains a query parameter with 'url='. It further ensures that the URL does not redirect to another vconfex.com domain, while also accounting for exclusions related to unsubscribe links and trusted sender domains. The severity of this rule is classified as medium due to its specific targeting of phishing and malware tactics, which may leverage open redirects to mislead users into disclosing credentials or downloading malicious payloads. The approaches for detection rely on thorough sender and URL analysis, ensuring a holistic view of potential threats from emails perceived to be untrustworthy or compromised.
Categories
  • Web
  • Endpoint
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Network Traffic
  • Application Log
Created: 2025-02-11