
Summary
This detection rule identifies potential brand impersonation attacks targeting the Box file sharing service. It primarily focuses on email threats that use the Box brand to trick users into providing sensitive information. The rule differentiates legitimate communications from malicious ones by analyzing the presence of Box-related logos, specific collaboration-related language, and Box's physical address. The detection logic ensures that messages are flagged if they originate from unauthorized senders, particularly those not linked to the legitimate box.com domain. Additionally, messages that fail DMARC authentication, especially from high-trust sender domains or contain forwarding characteristics, are scrutinized to prevent evasion attempts. Various analytical methods, including computer vision for logo detection and content analysis for contextual language, are employed to enhance detection accuracy and reduce false positives.
Categories
- Web
- Cloud
- Identity Management
Data Sources
- User Account
- Network Traffic
- Application Log
Created: 2025-09-24