
Summary
This detection rule targets open redirect vulnerabilities specifically associated with the MSN domain, which can potentially be exploited in credential phishing and malware distribution attacks. The rule identifies malicious redirects by analyzing incoming messages that contain links leading to the MSN website's lifestyle section. It checks for the presence of a certain path (`/en-gb/lifestyle/rf-best-products-uk/redirect`) and verifies that the query parameters have a 'url' component indicating the possibility of an open redirect. The presence of this open redirect can allow attackers to disguise phishing links or redirect users to malicious websites under the guise of a legitimate Microsoft service link. The rule employs sender and URL analysis methods to determine malicious intent, making it an effective approach to safeguard users from such threats.
Categories
- Web
- Network
Data Sources
- User Account
- Application Log
Created: 2022-12-10