EXPLORE
← Back to Explore
sublimemediumRule

Mismatched links: Free file share with urgent language

Detects messages from first-time senders containing free file sharing links, multiple urgent language indicators, and mismatched link text.

Detection Query

type.inbound

// Unsolicited + new sender
and (
  profile.by_sender_email().prevalence in ("new", "outlier")
  and not profile.by_sender_email().solicited
)
and not profile.by_sender_email().any_messages_benign

// Free file share
and any(body.links, .href_url.domain.domain in $free_file_hosts)

// urgent language
and 3 of (
  any(ml.nlu_classifier(body.current_thread.text).entities, .name == "urgency"),
  any(ml.nlu_classifier(subject.subject).entities, .name == "urgency"),
  regex.icontains(body.current_thread.text,
                  'immediate|urgent|expire|suspend|action.{0,20}required|time.{0,10}sensitive|verify.{0,20}immediately|complete.{0,20}requested'
  ),
  regex.icontains(subject.subject,
                  'immediate|urgent|expire|suspend|action.{0,20}required|important.{0,20}announcement'
  ),
  regex.icontains(body.current_thread.text,
                  'deadline|expires?.{0,10}(today|soon)|act.{0,10}now|time.{0,10}running.{0,10}out|limited.{0,10}time'
  )
)

// Mismatched link
and any(body.links,
        .mismatched == true
        and length(body.links) <= 3
        and not .href_url.domain.root_domain in (
          "mimecast.com",
          "mimecastprotect.com"
        )
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Mismatched links: Free file share with urgent language"
description: "Detects messages from first-time senders containing free file sharing links, multiple urgent language indicators, and mismatched link text."
type: "rule"
severity: "medium"
source: |
  type.inbound
  
  // Unsolicited + new sender
  and (
    profile.by_sender_email().prevalence in ("new", "outlier")
    and not profile.by_sender_email().solicited
  )
  and not profile.by_sender_email().any_messages_benign
  
  // Free file share
  and any(body.links, .href_url.domain.domain in $free_file_hosts)
  
  // urgent language
  and 3 of (
    any(ml.nlu_classifier(body.current_thread.text).entities, .name == "urgency"),
    any(ml.nlu_classifier(subject.subject).entities, .name == "urgency"),
    regex.icontains(body.current_thread.text,
                    'immediate|urgent|expire|suspend|action.{0,20}required|time.{0,10}sensitive|verify.{0,20}immediately|complete.{0,20}requested'
    ),
    regex.icontains(subject.subject,
                    'immediate|urgent|expire|suspend|action.{0,20}required|important.{0,20}announcement'
    ),
    regex.icontains(body.current_thread.text,
                    'deadline|expires?.{0,10}(today|soon)|act.{0,10}now|time.{0,10}running.{0,10}out|limited.{0,10}time'
    )
  )
  
  // Mismatched link
  and any(body.links,
          .mismatched == true
          and length(body.links) <= 3
          and not .href_url.domain.root_domain in (
            "mimecast.com",
            "mimecastprotect.com"
          )
  )
attack_types:
  - "BEC/Fraud"
  - "Callback Phishing"
  - "Credential Phishing"
  - "Extortion"
  - "Malware/Ransomware"
  - "Spam"
tactics_and_techniques:
  - "Free file host"
  - "Social engineering"
detection_methods:
  - "Natural Language Understanding"
  - "Sender analysis"
  - "URL analysis"
id: "478334c8-66be-5cc2-8bd5-3422cc8d2e9d"