heroui logo

Credential Phishing via Dropbox comment abuse

Sublime Rules

View Source
Summary
This detection rule identifies credential phishing attempts that exploit the Dropbox brand through comment abuse, using legitimate Dropbox infrastructure to conceal malicious content. The rule focuses on signals such as inbound email communication that lacks attachments, originates from Dropbox's domains (dropbox.net or dropbox.com), and passes DMARC authentication checks to ensure that the emails are not spoofed. It looks for mentions of the Dropbox brand in the email body or accompanying images, thus leveraging trust in the brand for potentially nefarious purposes. The rule further checks for impersonation of commonly abused brands by scanning for specific keywords linked to financial transactions, customer support, and other related services. Moreover, it examines the email body for the presence of any email address, validating that the referenced email might belong to a freemail service, suggesting that the attacker is trying to pivot from the Dropbox comment to a target account. This rule encapsulates various aspects of social engineering, evasion tactics, and the utilization of out-of-band communication methods for credential theft.
Categories
  • Identity Management
  • Web
  • Cloud
  • Application
  • Endpoint
Data Sources
  • User Account
  • Web Credential
  • Process
Created: 2024-01-16