Skip to content

Add detection rule for SharePoint file sharing impersonation#4129

Open
IndiaAce wants to merge 2 commits intomainfrom
india.fn.na.create_sharepoint_filename_matches_sendername
Open

Add detection rule for SharePoint file sharing impersonation#4129
IndiaAce wants to merge 2 commits intomainfrom
india.fn.na.create_sharepoint_filename_matches_sendername

Conversation

@IndiaAce
Copy link
Member

@IndiaAce IndiaAce commented Mar 5, 2026

Description

This rule detects suspicious file sharing notifications with SharePoint or OneDrive links from external domains, where the link display text matches the sender's name, indicating potential impersonation.

Associated samples

Associated hunts

This rule detects suspicious file sharing notifications with SharePoint or OneDrive links from external domains, where the link display text matches the sender's name, indicating potential impersonation.
@IndiaAce IndiaAce requested a review from a team March 5, 2026 22:50
@IndiaAce IndiaAce requested a review from a team as a code owner March 5, 2026 22:50
github-actions bot added a commit that referenced this pull request Mar 5, 2026
…e sharing impersonation with external SharePoint links
@github-actions github-actions bot added the in-test-rules PR is in our testing suite to collect telemetry label Mar 5, 2026
github-actions bot added a commit that referenced this pull request Mar 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

in-test-rules PR is in our testing suite to collect telemetry

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant