
Summary
This rule detects potential phishing attempts through impersonation of cloud storage services utilizing malicious communication strategies. It identifies inbound messages that attempt to trick users into revealing their credentials by containing hyperlinks to free file hosting services, along with screenshots that display high-confidence indicators of credential theft. The analysis focuses on messages that include a limited number of hyperlinks (less than 8) and are likely related to cloud or storage services based on sender details and subject lines. It leverages various techniques such as optical character recognition (OCR) on screenshots to extract text, natural language processing for intent recognition, and regex patterns to capture urgency tactics related to storage limitations or account issues. The detection also safeguards against trusted domains to prevent false positives while maintaining the ability to thoroughly analyze message structures and URL origins, ensuring comprehensive monitoring for deceptive tactics.
Categories
- Cloud
- Web
- Identity Management
Data Sources
- User Account
- Web Credential
- Network Traffic
Created: 2025-09-13