heroui logo

GSuite Email Suspicious Attachment

Splunk Security Content

View Source
Summary
The 'GSuite Email Suspicious Attachment' detection rule identifies suspicious email attachments within GSuite Gmail logs that could indicate spear-phishing attacks. By analyzing file extensions of email attachments against a predefined list of potentially malicious types (e.g., .exe, .bat, .js), the rule seeks to spot threats early. The analytics are critical given that these file types are primarily used to inject harmful payloads into target systems, risking unauthorized access, data breaches, and further network infiltration. It specifies a search command that filters and categorizes identified emails, retaining key metrics like counts of attachments and their respective SHA256 hashes. Additionally, the implementation requires ingestion of GSuite logs containing pertinent metadata about attachments, enhancing the detection's effectiveness in recognizing genuine threats.
Categories
  • Cloud
  • GCP
  • Web
Data Sources
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
  • Group
ATT&CK Techniques
  • T1566.001
  • T1566
Created: 2024-11-14