
Summary
This detection rule identifies incoming email messages that contain EML attachments with embedded SVG files which may contain malicious JavaScript code. It focuses on specific patterns within the code that can indicate malicious intent, such as the presence of 'onload' events, redirection via 'window.location.href', error handling with 'onerror', and the use of data URIs in iframe elements. The rule performs a thorough analysis of the attachment's content type and checks for specific file extensions while leveraging various encoding formats for text parsing. Key techniques employed include the use of regular expressions and base64 scanning to detect potential threats embedded within the SVG content.
Categories
- Endpoint
- Web
- Cloud
- Mobile
Data Sources
- File
- User Account
- Network Traffic
Created: 2025-03-04