heroui logo

Service abuse: Google application integration redirecting to suspicious hosts

Sublime Rules

View Source
Summary
This detection rule monitors incoming emails from the legitimate Google application integration email address (noreply-application-integration@google.com). It looks for emails where the links redirect to suspicious free file hosting services or subdomain hosts, which could indicate abuse of Google's services for malicious intentions. The rule checks multiple conditions: it verifies that the email passes DMARC authentication, contains fewer than 10 links, and examines each link to determine if it points to known suspicious domains or hosts. The logic considers links related to Microsoft's OAuth process and includes additional checks for recently registered domains (less than 30 days old) and certain Google subdomains that may indicate abusive behavior. This rule aims to catch credential phishing attacks or malware distribution via links embedded in these emails, leveraging various detection methods such as header analysis, sender analysis, and URL analysis.
Categories
  • Cloud
  • Web
  • Identity Management
Data Sources
  • User Account
  • Web Credential
  • Network Traffic
Created: 2025-12-18