[update] Microsoft infrastructure abuse with suspicious patterns #3567
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
The modified rule significantly expands detection capabilities beyond the original version. While the original rule primarily relied on header analysis and a basic phone number regex pattern, the enhanced version adds three major improvements:
The modified rule also adds "invites" as a suspicious sender local part and updates detection methods to include "Content analysis" and "Natural Language Understanding," transforming the rule from a primarily header-based detector into a comprehensive multi-signal analyzer that catches both infrastructure abuse and sophisticated social engineering tactics used in Microsoft-themed callback phishing campaigns.
Associated samples
Associated hunts