High Severity
Brand impersonation: Microsoft Teams
Description
Impersonation of a Microsoft Teams message.
References
No references.
Sublime Security
Created Aug 17th, 2023 • Last updated Dec 3rd, 2024
Feed Source
Sublime Core Feed
Source
type.inbound
and length(filter(attachments,
.file_type in $file_types_images or .file_type == "pdf"
)
) < 10
and any(attachments,
(.file_type in $file_types_images or .file_type == "pdf")
and any(file.explode(.),
regex.icontains(.scan.ocr.raw,
"trying to reach you.*microsoft teams"
)
)
)
and sender.email.domain.root_domain not in (
"microsoft.com",
"microsoftsupport.com",
"office.com"
)
Playground
Test against your own EMLs or sample data.