• Sublime Core Feed
Medium Severity

Attachment: Dropbox image lure with no Dropbox domains in links

Labels

Credential Phishing
Impersonation: Brand
Social engineering
Content analysis
File analysis
Header analysis
Optical Character Recognition
Sender analysis

Description

Detects Dropbox phishing emails with no Dropbox links with image attachments from an untrusted sender.

References

No references.

Sublime Security
Created Aug 17th, 2023 • Last updated Jan 23rd, 2024
Feed Source
Sublime Core Feed
Source
GitHub
type.inbound
and length(filter(attachments, .file_type not in $file_types_images)) == 0
and any(body.links,
        not strings.ilike(.href_url.domain.root_domain, "dropbox.*")
)
and any(attachments,
        .file_type in $file_types_images
        and any(file.explode(.),
                strings.ilike(.scan.ocr.raw, "*dropbox*")
                and strings.ilike(.scan.ocr.raw, "*review*", "*sign*")
        )
)
and (
  not profile.by_sender().solicited
  or profile.by_sender().any_messages_malicious_or_spam
)
and not profile.by_sender().any_false_positives 
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Get Started