heroui logo

Salesforce Infrastructure Abuse

Sublime Rules

View Source
Summary
The Salesforce Infrastructure Abuse detection rule aims to identify phishing messages that originate from Salesforce and exhibit characteristics consistent with credential theft. The rule checks multiple criteria, including the return-path of the email, the presence of links to external domains, and specific subject line patterns that are typically associated with phishing attempts. It utilizes various analysis methods, such as content analysis, header analysis, and natural language understanding to detect malicious intent. The rule triggers if certain conditions are met: messages from the sender domain that either resemble high-confidence credential theft indicators or possess suspicious subject lines indicative of phishing tactics, while also ensuring the email's links do not lead to recognized Salesforce domains. By analyzing both the sender's profile and the content, it differentiates potentially harmful communications from legitimate Salesforce communications, countering evasion techniques often used by attackers to impersonate trusted sources.
Categories
  • Cloud
  • Web
  • Endpoint
Data Sources
  • User Account
  • Network Traffic
  • Application Log
Created: 2023-11-22