heroui logo

Microsoft Infrastructure Abuse With Suspicious Patterns

Sublime Rules

View Source
Summary
This detection rule identifies potentially malicious activities associated with the abuse of Microsoft's services, targeting behaviors that are indicative of business email compromise (BEC) and fraud. The rule specifically looks for inbound communications where the sender appears to be using a Microsoft domain but has suspicious return paths or recipients that do not belong to the organization's trusted domains. Key indicators include the presence of default Microsoft 365 domains (e.g., 'onmicrosoft.com') and unusual return paths that do not match known Microsoft domains. The rule performs header and recipient analysis to look for single recipient emails exclusively using 'onmicrosoft.com', while also validating the email headers for anomalies. If the body of the email includes patterns resembling phone numbers, this adds another dimension of potential social engineering activity. Overall, the rule employs multiple checks to ensure that communications labeled as coming from Microsoft are indeed legitimate and not part of an impersonation or phishing attempt.
Categories
  • Web
  • Endpoint
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Network Traffic
Created: 2024-09-04