
Summary
This rule is designed to identify potential HTML smuggling attacks that impersonate Microsoft login pages. It scans for attachments with HTML file extensions or common archive formats and tests them for specific characteristics that indicate malicious intent. The rule checks for high entropy, which suggests obfuscated content, and ensures that the files are recognized as valid HTML documents without any JavaScript identifiers. It additionally looks for URLs in the content that do not belong to known trusted domains, apart from a set of exceptions including popular subdomain hosts. The detection logic also incorporates sender profile analysis to differentiate unsolicited messages from legitimate communications, thereby reducing the likelihood of false positives. Overall, the rule is effective at detecting phishing attempts targeting users through social engineering techniques.
Categories
- Web
- Cloud
- Identity Management
Data Sources
- File
- Network Traffic
- Application Log
- Process
- User Account
Created: 2022-06-10