heroui logo

Push Security Phishing Attack

Panther Rules

View Source
Summary
The Push Security Phishing Attack rule is designed to detect and respond to potential phishing incidents targeted at users within an organization, particularly when accessing applications like OKTA through web browsers such as Chrome. The rule operates in two modes: 'BLOCK' and 'MONITOR'. In the 'BLOCK' mode, the rule actively prevents users from accessing malicious URLs identified as phishing (e.g., https://evil.com/okta.php), and it generates a log entry capturing relevant details including the affected user's information, the source IP address, the referrer URL, and the user agent string. In 'MONITOR' mode, the rule still logs similar information but allows access to the potentially dangerous URL while enabling further investigation into the incident without immediate disruption to user operations. Both modes help elevate the organization's security posture by monitoring and mitigating risks associated with phishing attempts that target sensitive applications and user credentials.
Categories
  • Web
  • Identity Management
  • Cloud
Data Sources
  • Web Credential
  • Network Traffic
  • Application Log
Created: 2024-06-27