EXPLORE
← Back to Explore
sublimemediumRule

Link to Google Apps Script macro via comment tagging

Message contains a Google Apps Script macro link invoked from a comment on Google Slides|Docs. App Scripts can run arbitrary code, including redirecting the user to a malicious web page.

Detection Query

type.inbound
and regex.contains(sender.display_name, '\(Google (Slides|Docs)')
and any(body.links,
        .href_url.domain.domain == "script.google.com"
        and strings.ilike(.href_url.path, "/macros*")
)
and 1 of (
  strings.ilike(body.plain.raw, '*you have ? hours*'),
  strings.ilike(body.plain.raw, '*transfer of funds*'),
  strings.ilike(body.plain.raw, '*order your funds*')
  // Or the Sender Display Name is not in your Org Display Names
  or not any($org_display_names,
             strings.istarts_with(sender.display_name,
                                  strings.concat(., " (Google ")
             )
  )
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Link to Google Apps Script macro via comment tagging"
description: |
  Message contains a Google Apps Script macro link invoked from a comment on Google Slides|Docs.
  App Scripts can run arbitrary code, including redirecting the user to a malicious web page.
references:
  - "https://twitter.com/bunnymaid/status/1415478829162762240"
  - "https://playground.sublimesecurity.com?id=de1a2916-3812-4caa-a443-d1986487d772"
type: "rule"
severity: "medium"
source: |
  type.inbound
  and regex.contains(sender.display_name, '\(Google (Slides|Docs)')
  and any(body.links,
          .href_url.domain.domain == "script.google.com"
          and strings.ilike(.href_url.path, "/macros*")
  )
  and 1 of (
    strings.ilike(body.plain.raw, '*you have ? hours*'),
    strings.ilike(body.plain.raw, '*transfer of funds*'),
    strings.ilike(body.plain.raw, '*order your funds*')
    // Or the Sender Display Name is not in your Org Display Names
    or not any($org_display_names,
               strings.istarts_with(sender.display_name,
                                    strings.concat(., " (Google ")
               )
    )
  )
attack_types:
  - "Credential Phishing"
  - "Malware/Ransomware"
tactics_and_techniques:
  - "Social engineering"
detection_methods:
  - "Content analysis"
  - "Sender analysis"
  - "URL analysis"
id: "66fecd30-4628-5e53-b3cb-5355a6741487"