
Summary
This detection rule identifies potential brand impersonation attacks targeting users through email communication. The rule looks for messages that contain language typical of quarantine release notifications, such as terms like 'release', 'quarantine', 'blocked', and 'notification', appearing at least three times within the email body. The email must also include attachments that are likely logos but exhibit low character recognition scores, indicating they may not be authentic. Importantly, the email sender’s domain must not be from recognized Microsoft domains, ensuring that the alert flags only suspicious impersonation attempts. The detection leverages multiple methods, including machine learning for logo detection, content filtering, and sender domain analysis to minimize false positives and enhance reliability.
Categories
- Endpoint
- Web
Data Sources
- User Account
- Application Log
- Network Traffic
- Process
Created: 2024-05-10