Skip to content

Commit

Permalink
Sync from PR#2250
Browse files Browse the repository at this point in the history
Create link_hidden_dir.yml by @zoomequipd
#2250
Source SHA f6ef607
Triggered by @zoomequipd
  • Loading branch information
Sublime Rule Testing Bot committed Dec 27, 2024
1 parent 5c1c06e commit 6153ca2
Showing 1 changed file with 45 additions and 0 deletions.
45 changes: 45 additions & 0 deletions detection-rules/link_hidden_dir.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
name: "Link: Common Hidden Directory Observed"
description: "Links in the message point to sensitive system directories like .git, .env, or .well-known that could expose confidential configuration data or system files. Actors will often abuse these directories to hide credential phishing landing pages of compromised sites."
type: "rule"
severity: "medium"
source: |
type.inbound
and length(body.links) < 10
and any(body.links,
(
strings.icontains(.href_url.path, "/.well-known/")
and not strings.icontains(.href_url.path, '/.well-known/security.txt')
)
or strings.icontains(.href_url.path, "/.js/")
or strings.icontains(.href_url.path, "/.env/")
or strings.icontains(.href_url.path, "/.git/")
or strings.icontains(.href_url.path, "/.svn/")
or strings.icontains(.href_url.path, "/.hg/")
or strings.icontains(.href_url.path, "/.DS_Store/")
or strings.icontains(.href_url.path, "/.htpasswd/")
or strings.icontains(.href_url.path, "/.htaccess/")
or strings.icontains(.href_url.path, "/.bash_history/")
or strings.icontains(.href_url.path, "/.bashrc/")
or strings.icontains(.href_url.path, "/.zshrc/")
or strings.icontains(.href_url.path, "/.profile/")
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and not headers.auth_summary.dmarc.pass
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
tags:
- "Attack surface reduction"
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Evasion"
detection_methods:
- "URL analysis"
- "HTML analysis"
id: "9f316da6-821c-5fed-b967-80fc0e740626"
testing_pr: 2250
testing_sha: f6ef607e1659b7957561ba22b7f00127c63de349

0 comments on commit 6153ca2

Please sign in to comment.