
Summary
This rule is designed to detect potential phishing attempts that exploit an open redirect vulnerability associated with the domain cm.labcluster.com. The detection identifies messages that include links to the specified redirect URL, emphasizing the '/go.aspx' path combined with a query parameter containing 'url='. Further, the rule incorporates checks to ensure that the redirect is not pointing back to the legitimate labcluster.com domain, thus flagging any attempts that could lead to credential harvesting or malware distribution. The use of trusted sender analysis and DMARC authentication status helps reduce false positives by excluding domains known for safe email practices unless they fail DMARC checks.
Categories
- Web
- Cloud
- Network
Data Sources
- User Account
- Network Traffic
- Process
Created: 2025-03-20