Skip to content

Commit

Permalink
Merge PR #5061 from @dan21san - Update `Mail Forwarding/Redirecting A…
Browse files Browse the repository at this point in the history
…ctivity In O365`

update: Mail Forwarding/Redirecting Activity In O365 - Add additional parameters to increase coverage
 
---------

Co-authored-by: nasbench <[email protected]>
  • Loading branch information
dan21san and nasbench authored Nov 17, 2024
1 parent 5aa8994 commit 4e9ef00
Showing 1 changed file with 6 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,10 @@ status: test
description: Detects email forwarding or redirecting acitivty in O365 Audit logs.
references:
- https://redcanary.com/blog/email-forwarding-rules/
- https://github.com/PwC-IR/Business-Email-Compromise-Guide/blob/fe29ce06aef842efe4eb448c26bbe822bf5b895d/PwC-Business_Email_Compromise-Guide.pdf
author: RedCanary Team (idea), Harjot Singh @cyb3rjy0t
date: 2023-10-11
modified: 2024-11-17
tags:
- attack.exfiltration
- attack.t1020
Expand All @@ -31,9 +33,12 @@ detection:
- 'New-InboxRule'
- 'Set-InboxRule'
Parameters|contains:
- 'ForwardTo'
- 'ForwardAsAttachmentTo'
- 'ForwardingAddress'
- 'ForwardingSmtpAddress'
- 'ForwardTo'
- 'RedirectTo'
- 'RedirectToRecipients'
condition: 1 of selection_*
falsepositives:
- False positives are expected from legitimate mail forwarding rules. You need organisation specific knowledge. Filter out the domains that are allowed as forwarding targets as well as any additional metadata that you can use for exclusion from trusted sources/targets in order to promote this to a potential detection rule.
Expand Down

0 comments on commit 4e9ef00

Please sign in to comment.