
Summary
This detection rule identifies potential phishing attempts that exploit an open redirect vulnerability associated with the domain 'giving.lluh.org'. The rule is triggered when an inbound message includes links to 'giving.lluh.org' with a specific path indicating user login. It further checks if the URL's query parameters contain 'nexturl=', which is a common technique used by attackers to redirect users to a malicious site after they enter their credentials. The rule also incorporates sender reputation analysis, excluding messages from highly trusted domains unless they fail DMARC authentication, and considers the overall behavior of the sender to identify malicious patterns. By examining the contents, headers, and sender characteristics of emails, this rule aims to effectively flag potentially harmful messages while minimizing false positives.
Categories
- Web
- Endpoint
Data Sources
- Web Credential
- User Account
- Network Traffic
Created: 2024-10-30