CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected High Rule
| Id | 22f49d67-7da7-4809-8d07-89e4478aa6b0 |
| Rulename | CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected High Rule |
| Description | “Detects high-severity alerts related to impersonation of official social media handles associated with your brand. These spoofed accounts may be used for phishing, disinformation, or fraud campaigns, posing significant reputational and security risks.” |
| Severity | High |
| Tactics | Reconnaissance ResourceDevelopment InitialAccess |
| Techniques | T1589.003 T1591.002 T1585.001 T1566.002 |
| Required data connectors | CyfirmaBrandIntelligenceAlertsDC |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BISocialMediaHandlerHighRule.yaml |
| Version | 1.0.1 |
| Arm template | 22f49d67-7da7-4809-8d07-89e4478aa6b0.json |
// High severity - Social Media Handle Impersonation
let timeFrame = 5m;
CyfirmaBISocialHandlersAlerts_CL
| where severity == 'Critical' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
SourceSype=source_type,
ProviderName="CYFIRMA",
ProductName="DeCYFIR/DeTCT"
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
SourceSype,
ProductName,
ProviderName
relevantTechniques:
- T1589.003
- T1591.002
- T1585.001
- T1566.002
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.0.1
id: 22f49d67-7da7-4809-8d07-89e4478aa6b0
severity: High
kind: Scheduled
queryFrequency: 5m
description: |
"Detects high-severity alerts related to impersonation of official social media handles associated with your brand.
These spoofed accounts may be used for phishing, disinformation, or fraud campaigns, posing significant reputational and security risks."
requiredDataConnectors:
- connectorId: CyfirmaBrandIntelligenceAlertsDC
dataTypes:
- CyfirmaBISocialHandlersAlerts_CL
triggerOperator: gt
name: CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected High Rule
tactics:
- Reconnaissance
- ResourceDevelopment
- InitialAccess
alertDetailsOverride:
alertDescriptionFormat: '{{Description}} '
alertDynamicProperties:
- value: ProductName
alertProperty: ProductName
- value: ProviderName
alertProperty: ProviderName
alertDisplayNameFormat: 'CYFIRMA - High Severity Social Media Handle Impersonation Detected - {{AssetType}} : {{AssetValue}} '
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BISocialMediaHandlerHighRule.yaml
triggerThreshold: 0
queryPeriod: 5m
query: |
// High severity - Social Media Handle Impersonation
let timeFrame = 5m;
CyfirmaBISocialHandlersAlerts_CL
| where severity == 'Critical' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
SourceSype=source_type,
ProviderName="CYFIRMA",
ProductName="DeCYFIR/DeTCT"
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
SourceSype,
ProductName,
ProviderName
status: Available
customDetails:
UID: UID
RiskScore: RiskScore
SourceSype: SourceSype
LastSeen: LastSeen
Description: Description
AlertUID: AlertUID
FirstSeen: FirstSeen
AssetValue: AssetValue
TimeGenerated: TimeGenerated
Impact: Impact
Recommendation: Recommendation
AssetType: AssetType
incidentConfiguration:
createIncident: true
groupingConfiguration:
lookbackDuration: PT5H
enabled: false
reopenClosedIncident: false
matchingMethod: AllEntities