EXPLORE
← Back to Explore
sublimehighRule

Link: Multistage landing - JotForm abuse

Detects a disabled JotForm that contains suspicious elements like secured document messaging, cloned forms, or suspicious action words in form items. Also checks for human verification pages and embedded links to credential collection sites.

MITRE ATT&CK

defense-evasioninitial-access

Detection Query

type.inbound
and length(filter(body.links, .href_url.domain.root_domain == "jotform.com")) > 0
and any(filter(body.links, .href_url.domain.root_domain == "jotform.com"),
        // the form as been disabled
        strings.icontains(ml.link_analysis(.).final_dom.inner_text,
                          'This form is disabled...'
        )
        // lure to open a document with phishing intent
        or (
          any(ml.link_analysis(.).final_dom.links,
              regex.icontains(.display_text, "VIEW DOCUMENT ONLINE")
              and ml.link_analysis(.href_url).credphish.disposition == "phishing"
          )
        )
        // it contains suspicious elements within the extracted "appInfo"
        or any(regex.iextract(ml.link_analysis(.).final_dom.raw,
                              'window\.__appInfo = (?P<appInfo>\{[^\n]+\})\;\n'
               ),
               // the title/description/name contains suspicious keywords
               any([
                     strings.parse_json(.named_groups["appInfo"])["title"],
                     strings.parse_json(.named_groups["appInfo"])["description"],
                     strings.parse_json(.named_groups["appInfo"])["name"]
                   ],
                   strings.icontains(., 'secured document')
                   or strings.icontains(., 'Adobe PDF')
               )
               or any(strings.parse_json(.named_groups["appInfo"])["items"],
                      // find any links that mention common "action" words
                      any([.["description"], .["title"]],
                          regex.icontains(.,
                                          '(?:view|click|show|access|download|goto|Validate|Va[il]idar|login|verify|account)'
                          )
                      )

                      // inspect the linked page within the "buttonValue" or .title contains a link
                      or (
                        any([.["buttonValue"], .["title"]],
                            strings.icontains(., 'http')
                            and (
                              ml.link_analysis(strings.parse_url(.)).credphish.disposition == "phishing"
                              or ml.link_analysis(strings.parse_url(.)).credphish.contains_captcha == true
                              or strings.istarts_with(ml.link_analysis(strings.parse_url(.
                                                                       )
                                                      ).final_dom.inner_text,
                                                      'Verify you are human'
                              )
                            )
                        )
                      )
               )
        )
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Link: Multistage landing - JotForm abuse"
description: "Detects a disabled JotForm that contains suspicious elements like secured document messaging, cloned forms, or suspicious action words in form items. Also checks for human verification pages and embedded links to credential collection sites."
type: "rule"
severity: "high"
source: |
  type.inbound
  and length(filter(body.links, .href_url.domain.root_domain == "jotform.com")) > 0
  and any(filter(body.links, .href_url.domain.root_domain == "jotform.com"),
          // the form as been disabled
          strings.icontains(ml.link_analysis(.).final_dom.inner_text,
                            'This form is disabled...'
          )
          // lure to open a document with phishing intent
          or (
            any(ml.link_analysis(.).final_dom.links,
                regex.icontains(.display_text, "VIEW DOCUMENT ONLINE")
                and ml.link_analysis(.href_url).credphish.disposition == "phishing"
            )
          )
          // it contains suspicious elements within the extracted "appInfo"
          or any(regex.iextract(ml.link_analysis(.).final_dom.raw,
                                'window\.__appInfo = (?P<appInfo>\{[^\n]+\})\;\n'
                 ),
                 // the title/description/name contains suspicious keywords
                 any([
                       strings.parse_json(.named_groups["appInfo"])["title"],
                       strings.parse_json(.named_groups["appInfo"])["description"],
                       strings.parse_json(.named_groups["appInfo"])["name"]
                     ],
                     strings.icontains(., 'secured document')
                     or strings.icontains(., 'Adobe PDF')
                 )
                 or any(strings.parse_json(.named_groups["appInfo"])["items"],
                        // find any links that mention common "action" words
                        any([.["description"], .["title"]],
                            regex.icontains(.,
                                            '(?:view|click|show|access|download|goto|Validate|Va[il]idar|login|verify|account)'
                            )
                        )
  
                        // inspect the linked page within the "buttonValue" or .title contains a link
                        or (
                          any([.["buttonValue"], .["title"]],
                              strings.icontains(., 'http')
                              and (
                                ml.link_analysis(strings.parse_url(.)).credphish.disposition == "phishing"
                                or ml.link_analysis(strings.parse_url(.)).credphish.contains_captcha == true
                                or strings.istarts_with(ml.link_analysis(strings.parse_url(.
                                                                         )
                                                        ).final_dom.inner_text,
                                                        'Verify you are human'
                                )
                              )
                          )
                        )
                 )
          )
  )
attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "Evasion"
  - "Social engineering"
detection_methods:
  - "Content analysis"
  - "HTML analysis"
  - "Javascript analysis"
  - "URL analysis"
id: "5b64326f-e38e-558c-8b5f-d9e7ddee2f69"