heroui logo

Attachment: Fake attachment image lure

Sublime Rules

View Source
Summary
The rule named 'Attachment: Fake attachment image lure' detects potential phishing attempts that utilize deceptive image attachments resembling an Outlook attachment button. It focuses on emails with fewer than eight attachments and checks each attachment for indicators of malice. The detection targets images that are falsely presented as files, particularly if their size is under 30KB or they contain text suggesting a file transfer (e.g., 'sent you'). The rule analyzes both the original email and any attached EML files, inspecting for fake logos and suspicious language via Optical Character Recognition (OCR) techniques. Special attention is given to the email's subject line, specifically excluding replies or forwarded emails to minimize false positives. It also distinguishes between trusted and untrusted sender domains based on DMARC authentication to prevent bypassing from known legitimate sources.
Categories
  • Web
  • Identity Management
  • Endpoint
Data Sources
  • User Account
  • Image
  • Web Credential
  • File
  • Process
Created: 2023-12-11