High Severity
Link: QR code with phishing disposition in img or pdf
Description
This rule analyzes image attachments for QR Codes in which LinkAnalysis concludes is phishing. The rule ensures that the URLs do not link to any organizational domains.
References
No references.
Sublime Security
Created Dec 6th, 2023 • Last updated Apr 14th, 2025
Feed Source
Sublime Core Feed
Source
type.inbound
and length(attachments) < 10
and any(attachments,
(.file_type in $file_types_images or .file_type == "pdf")
and any(file.explode(.),
.scan.qr.type == "url"
// linkanalysis phishing disposition
and any([ml.link_analysis(.scan.qr.url)],
.credphish.disposition == "phishing"
)
and .scan.qr.url.domain.root_domain not in $org_domains
)
)
and (
not profile.by_sender().solicited
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_messages_benign
)
or (
sender.email.domain.domain in $org_domains
and not headers.auth_summary.dmarc.pass
)
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and not headers.auth_summary.dmarc.pass
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
and (
// no messages from this sender email have been marked benign
not profile.by_sender_email().any_messages_benign
// or it's a spoof of the org_domain
or (
sender.email.domain.domain in $org_domains
and not headers.auth_summary.dmarc.pass
)
)
Playground
Test against your own EMLs or sample data.