Skip to content

This repo contains all my personal Sublime Security detection rules.

Notifications You must be signed in to change notification settings

morriscode/Sublime-Detection-Rules

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

96 Commits
 
 
 
 

Repository files navigation

Sublime Detection Rules

The aim of my detection rules is to detect attacks even without the LinkAnalysis and WHOIS features of Sublim Security. Since these two features process data in the cloud and not on-prem, there are always data protection concerns, at least in the EU. :)

Everything is a work in progress and should be reviewed before use in production. All these rules are in production use on our Sublime.

Rule Name Rule Description Rule Criticality
abuse_onmicrosoft_domain.yml Creating a new tenant on Entra will creates an "onmicrosoft.com" Domain. Now imagine, that there is a company called "abccorp", the attacker now creates a new tenant "abcorp" and uses this one for phishing. These emails are now come from "[email protected] instead of "[email protected] Medium
info_cisco_esa_bulk_mail.yml The Cisco ESA (Email Security Appliance) classifies emails according to bulk, marketing, social media and spam. This classification helps to recognise emails and their meaning. This rule is only used for classification within Sublime Automation. :) Info
info_cisco_esa_marketing_mail.yml The Cisco ESA (Email Security Appliance) classifies emails according to bulk, marketing, social media and spam. This classification helps to recognise emails and their meaning. This rule is only used for classification within Sublime Automation. :) Info
link_adclick_doubleclick_abuse.yml The Google Adclick network is generally an advertising network. Attackers use Adclick links to achieve a redirect to a malicious URL. Medium
scattered_spider.yml Scattered Spider uses separate domains for each victim. These domains can currently be found quite easily using regex. The attack pattern can of course also change. See CISA recommendation on Scattered Spider. High
spam_europol_fake.yml Attackers posing as "EUROPOL" are mainly active in Europe. Low
suspicious_parcel_pickup_notification.yml Phishing with fake pickup notifications Medium

About

This repo contains all my personal Sublime Security detection rules.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published