We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 554dae4 commit afb268fCopy full SHA for afb268f
detection-rules/3328_headers_kagoya.yml
@@ -0,0 +1,20 @@
1
+name: "Headers: Kagoya domain in routing"
2
+description: "Message contains kagoya.net domain in the email headers, indicating routing through Kagoya Internet Routing services."
3
+type: "rule"
4
+severity: "medium"
5
+source: |
6
+ type.inbound
7
+ and any(headers.domains, .root_domain == "kagoya.net")
8
+tags:
9
+ - "Attack surface reduction"
10
+attack_types:
11
+ - "Credential Phishing"
12
+ - "Malware/Ransomware"
13
+tactics_and_techniques:
14
+ - "Evasion"
15
+detection_methods:
16
+ - "Header analysis"
17
+id: "ee2ad621-8573-5eed-a68b-cb3494d5e575"
18
+og_id: "757dc3e1-7264-5509-9af1-7d44dd2e00d8"
19
+testing_pr: 3328
20
+testing_sha: 1aa6df86763fb7570ddff9c168d8481832413ded
0 commit comments