
Callback Phishing: AOL Senders with Suspicious HTML Template or PDF Attachment
Sublime Rules
View SourceSummary
This detection rule targets callback phishing attempts originating from AOL email accounts that employ consistent HTML formatting and PDF attachments. The rule is built upon several criteria intended to isolate suspicious emails from legitimate communications. It specifically looks for AOL senders without any benign history, with a single recipient and no reply references. The email's message ID must end in '@mail.yahoo.com', and the X-Mailer header must correspond to the AOL mail client. The rule requires either no attachments with distinctive HTML templates indicative of phishing or a single attachment that must be a PDF file exhibiting specific characteristics, such as content created by known tools and with distinctive identifiers in its metadata. The rule utilizes sophisticated content analysis techniques, leveraging header information, HTML structure, and file examination to accurately identify potential phishing threats.
Categories
- Endpoint
- Web
- Cloud
- Application
- Identity Management
Data Sources
- User Account
- Web Credential
- Process
- File
- Network Traffic
Created: 2025-04-29