CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected High Rule
| Id | 22f49d67-7da7-4809-8d07-89e4478aa6b0 |
| Rulename | CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected High Rule |
| Description | “Detects high-severity alerts related to impersonation of official social media handles associated with your brand. These spoofed accounts may be used for phishing, disinformation, or fraud campaigns, posing significant reputational and security risks.” |
| Severity | High |
| Tactics | Reconnaissance ResourceDevelopment InitialAccess |
| Techniques | T1589.003 T1591.002 T1585.001 T1566.002 |
| Required data connectors | CyfirmaBrandIntelligenceAlertsDC |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BISocialMediaHandlerHighRule.yaml |
| Version | 1.0.1 |
| Arm template | 22f49d67-7da7-4809-8d07-89e4478aa6b0.json |
// High severity - Social Media Handle Impersonation
let timeFrame = 5m;
CyfirmaBISocialHandlersAlerts_CL
| where severity == 'Critical' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
SourceSype=source_type,
ProviderName="CYFIRMA",
ProductName="DeCYFIR/DeTCT"
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
SourceSype,
ProductName,
ProviderName
queryPeriod: 5m
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
lookbackDuration: PT5H
matchingMethod: AllEntities
enabled: false
createIncident: true
severity: High
description: |
"Detects high-severity alerts related to impersonation of official social media handles associated with your brand.
These spoofed accounts may be used for phishing, disinformation, or fraud campaigns, posing significant reputational and security risks."
status: Available
triggerOperator: gt
kind: Scheduled
tactics:
- Reconnaissance
- ResourceDevelopment
- InitialAccess
relevantTechniques:
- T1589.003
- T1591.002
- T1585.001
- T1566.002
id: 22f49d67-7da7-4809-8d07-89e4478aa6b0
triggerThreshold: 0
queryFrequency: 5m
version: 1.0.1
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BISocialMediaHandlerHighRule.yaml
query: |
// High severity - Social Media Handle Impersonation
let timeFrame = 5m;
CyfirmaBISocialHandlersAlerts_CL
| where severity == 'Critical' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
SourceSype=source_type,
ProviderName="CYFIRMA",
ProductName="DeCYFIR/DeTCT"
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
SourceSype,
ProductName,
ProviderName
customDetails:
LastSeen: LastSeen
AssetValue: AssetValue
Description: Description
AssetType: AssetType
RiskScore: RiskScore
TimeGenerated: TimeGenerated
AlertUID: AlertUID
UID: UID
Impact: Impact
Recommendation: Recommendation
FirstSeen: FirstSeen
SourceSype: SourceSype
requiredDataConnectors:
- dataTypes:
- CyfirmaBISocialHandlersAlerts_CL
connectorId: CyfirmaBrandIntelligenceAlertsDC
alertDetailsOverride:
alertDynamicProperties:
- value: ProductName
alertProperty: ProductName
- value: ProviderName
alertProperty: ProviderName
alertDisplayNameFormat: 'CYFIRMA - High Severity Social Media Handle Impersonation Detected - {{AssetType}} : {{AssetValue}} '
alertDescriptionFormat: '{{Description}} '
eventGroupingSettings:
aggregationKind: AlertPerResult
name: CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected High Rule