EXPLORE
← Back to Explore
sublimehighRule

AnonymousFox indicators

Detects email messages that contain (anonymous|smtp)fox in the sender email address, X-Authenticated-Sender or X-Sender fields. This is indicative of messages sourced from an AnonymousFox compromised website.

Detection Query

type.inbound
and any(headers.hops,
        any(.fields,
            regex.icontains(.name, "X-Authenticated-Sender|X-Sender")
            and regex.icontains(.value, "(anonymous|smtp)fox-")
        )
        or regex.icontains(sender.email.email, "(anonymous|smtp)fox-")
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "AnonymousFox indicators"
description: |
  Detects email messages that contain (anonymous|smtp)fox in the sender email address, X-Authenticated-Sender or X-Sender fields.
  This is indicative of messages sourced from an AnonymousFox compromised website. 
references:
  - "https://sucuri.net/guides/anonymousfox-hack-guide/"
type: "rule"
severity: "high"
source: |
  type.inbound
  and any(headers.hops,
          any(.fields,
              regex.icontains(.name, "X-Authenticated-Sender|X-Sender")
              and regex.icontains(.value, "(anonymous|smtp)fox-")
          )
          or regex.icontains(sender.email.email, "(anonymous|smtp)fox-")
  )
attack_types:
  - "BEC/Fraud"
  - "Credential Phishing"
  - "Malware/Ransomware"
detection_methods:
  - "Header analysis"
  - "Sender analysis"
id: "2506206e-b879-57fa-bcfd-95c66eb02db8"