
Summary
This detection rule focuses on identifying potentially malicious POWR.io form links characterized by unverified creators or unusual traits. It utilizes comprehensive checks including filters based on the domain of the links, identifying key patterns in the URL structure such as 'form-builder', and monitoring for specific conditions like redirects to external domains that do not correspond to the sender's domain. Critical metadata checks are in place to assess the status and activity of the app creator, including their verification status and timezone origin. The rule catches signs of credential phishing and callback phishing, and it leverages multiple data assessment methods including file analysis, URL analysis, and content analysis to ensure an accurate and efficient detection process.
Categories
- Web
- Cloud
- Application
Data Sources
- Web Credential
- Container
- Process
Created: 2025-05-06