heroui logo

Brand impersonation: Microsoft quarantine release notification in image attachment

Sublime Rules

View Source
Summary
This rule is designed to detect and alert on phishing emails that impersonate Microsoft by sending notifications related to a quarantine release. The rule is particularly focused on emails with image attachments that may contain language associated with credential theft. The detection relies on various factors, including the length of attachments, the presence of specific keywords related to urgency and sender identity, and the analysis of context through natural language understanding and computer vision techniques. If an email’s sender is not from a confirmed Microsoft domain and fails certain authentication checks, the rule triggers, highlighting potential impersonation or phishing attempts. The emphasis is put on ensuring that the emails detected can convincingly appear as legitimate Microsoft communications, thereby prompting the need for careful scrutiny of attachments and embedded language.
Categories
  • Endpoint
  • Web
  • Cloud
  • Identity Management
  • Other
Data Sources
  • User Account
  • Image
  • Web Credential
  • Network Traffic
Created: 2024-05-10