
Summary
This detection rule focuses on identifying suspicious activity related to Trello boards that may be used for credential phishing or other malicious purposes. It is triggered by the analysis of inbound links that belong to the trello.com domain, particularly those that follow a specific path indicating a Trello board. Key indicators of potential abuse include the contents of the board, especially if they appear to have minimal information, have malicious attachments, or come from unsolicited senders. The rule incorporates complex logic to filter out links that contain phrases commonly associated with phishing and identifies boards that either have fewer than four cards or have been flagged for containing harmful content such as phishing links or malicious attachments. The detection utilizes multiple methods, such as URL and content analysis, sender reputation, and behaviors that indicate either account blockage or suspicious membership status. The high severity level implies that the rule is aimed at preventing credential theft through vigilant monitoring of illegitimate Trello links.
Categories
- Web
- Cloud
- Application
Data Sources
- Web Credential
- Network Traffic
Created: 2025-08-21