
Summary
This detection rule specifically targets emails containing attachments, typically PDFs or Microsoft Office documents, that include suspicious URLs directed at Cloudflare-protected pages using turnstile CAPTCHA systems. These emails often involve deceptive tactics, employing misleading sender names and urgent subject lines that suggest authority or immediate action required, reinforcing a sense of urgency that is typical of phishing attempts. The rule analyzes various aspects including the type of attachment, the nature of the URLs contained within, and the sender's profile. It explicitly flags attachments that link to domains associated with Cloudflare and identifies signs of phishing tactics including particular keywords in subjects that suggest account issues or reactive warnings. Additionally, it ensures that emails are not mistakenly categorized as dangerous when sent from trusted domains unless they fail DMARC authentication, indicating a possible spoofing or compromised trusted account.
Categories
- Endpoint
- Cloud
- Web
- Application
Data Sources
- User Account
- File
- Network Traffic
- Logon Session
Created: 2025-06-03