Skip to content
Draft
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 20 additions & 0 deletions detection-rules/link_storage_google_drive.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
name: "Link: Google Cloud Storage impersonating with googledrive in URL path"
description: "Detects inbound messages containing links to Google Cloud Storage (storage.googleapis.com) with paths ending in 'googledrive.html', indicating abuse of Google's cloud storage service to impersonate Google Drive and potentially deliver malicious content."
type: "rule"
severity: "high"
source: |
type.inbound
and any(body.links,
// use of storage.googleapis.com
.href_url.domain.domain == "storage.googleapis.com"
// with an actor controlled path that impersonates Google Drive
and strings.iends_with(.href_url.path, 'googledrive.html')
)
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Impersonation: Brand"
- "Free file host"
detection_methods:
- "URL analysis"
id: "fc41a43e-6eb7-5478-a19f-e7d2bac8ed8d"