
Summary
This detection rule targets suspicious messages originating from Adobe that may indicate malicious use, such as attempts at credential phishing. The rule leverages multiple indicators to identify potential threats including certain phrases, suspicious filenames (especially in all capital letters), and anomalies in the display name of the sender verified through Natural Language Understanding (NLU). Specifically, it focuses on messages from `message@adobe.com` that pass DMARC checks and contain links with calls to action like 'open' or 'review'. The rule excludes messages sent from authenticated Adobe users within the organization's domains to reduce false positives. Additional heavy filtering is performed on the message body to match common phishing patterns, observe sender names, examine file sharing mentions, and ensure the legitimacy of Microsoft branding. This comprehensive approach aims to minimize the risk posed by phishing attempts disguised as legitimate Adobe documents, thus enhancing organizational security.
Categories
- Cloud
- Web
- Endpoint
Data Sources
- User Account
- Process
- Web Credential
Created: 2024-11-13