
Summary
This detection rule identifies incoming emails that impersonate Adobe by containing its logo, links with suspicious language associated with typical phishing tactics, and attachments that are either images or none at all. The rule leverages machine learning to assess the logo's presence, checks the language of any links in the email body or attachments for common phishing phrases while filtering out legitimate phrases, and analyzes email headers to determine if the incoming message is a continuation of a previous thread or is unsolicited from the sender's profile. Additionally, it considers the domain of the sender, negating highly trusted domains unless they fail DMARC authentication, thus reducing false positive rates from legitimate sources. This protection targets credential phishing attacks specifically through brand impersonation and social engineering techniques, employing methods like computer vision for logo detection, content analysis for language checking, header analysis for email legitimacy, and sender analysis for risk assessment.
Categories
- Cloud
- Web
- Identity Management
Data Sources
- User Account
- Application Log
- File
Created: 2023-11-21